<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Humbl Engineer's Journal]]></title><description><![CDATA[A newsletter dedicated to the journey of learning and discovery in the world of technology and engineering. Aiming to bridge the gap between theory and practice, exploring everything from foundational concepts to advanced topics.]]></description><link>https://thehumblengineer.com</link><image><url>https://substackcdn.com/image/fetch/$s_!xs4N!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d8cc4d5-79f7-4107-af43-ce04cf88d054_1024x1024.png</url><title>The Humbl Engineer&apos;s Journal</title><link>https://thehumblengineer.com</link></image><generator>Substack</generator><lastBuildDate>Fri, 15 May 2026 22:01:40 GMT</lastBuildDate><atom:link href="https://thehumblengineer.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[The Humble Engineer]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[humblengineer@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[humblengineer@substack.com]]></itunes:email><itunes:name><![CDATA[The Humbl Engineer]]></itunes:name></itunes:owner><itunes:author><![CDATA[The Humbl Engineer]]></itunes:author><googleplay:owner><![CDATA[humblengineer@substack.com]]></googleplay:owner><googleplay:email><![CDATA[humblengineer@substack.com]]></googleplay:email><googleplay:author><![CDATA[The Humbl Engineer]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Economics of MCP Security ]]></title><description><![CDATA[Understanding the Attacker&#8217;s Calculus]]></description><link>https://thehumblengineer.com/p/the-economics-of-mcp-security-872</link><guid isPermaLink="false">https://thehumblengineer.com/p/the-economics-of-mcp-security-872</guid><dc:creator><![CDATA[The Humbl Engineer]]></dc:creator><pubDate>Thu, 01 May 2025 17:01:47 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/162586428/bc8528e3733e8b2d94889017e2628945.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><strong>Episode Title:</strong> Deep Dive: MCP Security - Key Risks &amp; What You Need to Know</p><p><strong>Episode Summary:</strong> This episode dives into the security of the Model Context Protocol (MCP), a framework for AI interaction. We cover critical vulnerabilities during deployment, operation, and maintenance, the current threat landscape, and essential security measures for organizations adopting MCP.</p><p><strong>Key Talking Points:</strong></p><ul><li><p><strong>What is MCP?</strong> A framework for AI models to act in the digital world.</p></li><li><p><strong>Why Security Matters Now:</strong> Rapid adoption brings new security challenges beyond human-to-machine interaction.</p></li><li><p><strong>Deployment Risks:</strong> Identity spoofing, supply chain compromise (malicious installers, backdoors).</p></li><li><p><strong>Operational Risks:</strong> Tool poisoning (manipulating AI via tool descriptions), credential theft, sandbox escapes.</p></li><li><p><strong>Maintenance Risks:</strong> Post-update privilege persistence, vulnerable version redeployment, security drift.</p></li><li><p><strong>Current Threats:</strong> Advanced attackers (nation states) see high reward potential; common attackers focused elsewhere for now.</p></li><li><p><strong>Key Defences:</strong> Community efforts, evolving MCP specs, vendor tools, open-source solutions.</p></li><li><p><strong>Top Takeaway:</strong> Bake security in from the start of MCP deployment with layered defences and constant monitoring.</p></li><li><p><strong>Looking Ahead:</strong> The need for a security-first approach to avoid MCP becoming a major security headache.</p></li></ul><p><strong>Call to Action:</strong></p><ul><li><p>Share your top security concerns about AI interaction in the comments.</p></li><li><p>What's one key security measure organizations should implement for MCP?</p></li><li><p>Subscribe for more deep dives into tech and security.</p></li></ul>]]></content:encoded></item><item><title><![CDATA[The Economics of MCP Security ]]></title><description><![CDATA[Understanding the Attacker&#8217;s Calculus]]></description><link>https://thehumblengineer.com/p/the-economics-of-mcp-security</link><guid isPermaLink="false">https://thehumblengineer.com/p/the-economics-of-mcp-security</guid><dc:creator><![CDATA[The Humbl Engineer]]></dc:creator><pubDate>Thu, 01 May 2025 17:00:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!mqxv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35c1f60-5871-436e-897b-dee3d637aae1_2048x2048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In our previous exploration of the <a href="https://thehumblengineer.com/p/model-context-protocol">Model Context Protocol (MCP)</a>, we examined its transformative potential for connecting AI models with external tools and data sources. While MCP promises to revolutionize how AI agents interact with enterprise systems, this increasing integration also creates new security considerations. In this article, we'll focus on the cybersecurity implications of MCP adoption, analyzing the most plausible attack vectors, their prerequisites, and the evolving economics that will drive attacker behaviour. As organizations increasingly embed MCP into critical workflows, understanding these security dimensions becomes essential for responsible implementation and risk management.</p><div class="native-audio-embed" data-component-name="AudioPlaceholder" data-attrs="{&quot;label&quot;:null,&quot;mediaUploadId&quot;:&quot;baf490c3-be5d-4cfc-a2b0-2e75f880d90a&quot;,&quot;duration&quot;:972.591,&quot;downloadable&quot;:false,&quot;isEditorNode&quot;:true}"></div><h2>TLDR: Key Takeaways</h2><ul><li><p><strong>Most Plausible Attacks:</strong> Identity spoofing, installer compromise, and token theft offer attackers the highest ROI currently.</p></li><li><p><strong>Attack Prerequisites:</strong> Most effective attacks require either user installation privileges or initial server compromise.</p></li><li><p><strong>Attacker Economics:</strong> Currently lower ROI than traditional attacks for most cybercriminals, but increasingly attractive for sophisticated actors targeting high-value organizations.</p></li><li><p><strong>Future Outlook:</strong> As MCP adoption in critical workflows grows, attack plausibility and ROI will increase significantly if security measures don't mature proportionately.</p></li><li><p><strong>Security Counterbalance:</strong> Proactive security approaches specifically designed for MCP could significantly alter this trajectory and maintain unfavourable economics for attackers.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mqxv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35c1f60-5871-436e-897b-dee3d637aae1_2048x2048.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mqxv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35c1f60-5871-436e-897b-dee3d637aae1_2048x2048.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mqxv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35c1f60-5871-436e-897b-dee3d637aae1_2048x2048.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mqxv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35c1f60-5871-436e-897b-dee3d637aae1_2048x2048.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mqxv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35c1f60-5871-436e-897b-dee3d637aae1_2048x2048.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mqxv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35c1f60-5871-436e-897b-dee3d637aae1_2048x2048.jpeg" width="1456" height="1456" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d35c1f60-5871-436e-897b-dee3d637aae1_2048x2048.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1456,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:711722,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://thehumblengineer.com/i/162567856?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35c1f60-5871-436e-897b-dee3d637aae1_2048x2048.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mqxv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35c1f60-5871-436e-897b-dee3d637aae1_2048x2048.jpeg 424w, https://substackcdn.com/image/fetch/$s_!mqxv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35c1f60-5871-436e-897b-dee3d637aae1_2048x2048.jpeg 848w, https://substackcdn.com/image/fetch/$s_!mqxv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35c1f60-5871-436e-897b-dee3d637aae1_2048x2048.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!mqxv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35c1f60-5871-436e-897b-dee3d637aae1_2048x2048.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Recap of MCP Architecture</h2><p>Model Context Protocol (MCP) creates connections between large language models and external tools, functioning as essential infrastructure for AI agents.  This protocol enables AI systems to access data, manipulate applications, and perform actions previously limited to human operators. As organizations rapidly adopt these capabilities to increase productivity and innovation, the security implications of this powerful bridge between AI and our tools grow increasingly significant.</p><p>While offering tremendous potential, each component of its architecture - the host where the AI lives, the client that mediates requests, and the server providing tool access - presents distinct attack vectors with varying prerequisites and returns on investment for attackers. </p><p>This trinity creates a complex security surface with vulnerabilities at each connection point and throughout its lifecycle. Let's examine each stage of this lifecycle to understand where the key vulnerabilities emerge.</p><h2>Deployment Phase Attacks</h2><h3>Name Collision and <a href="https://arxiv.org/html/2503.23278v2#S5">Identity Spoofing</a></h3><p><strong>Attack Mechanics:</strong> Attackers create fake MCP servers with deceptively similar names to legitimate ones (e.g., "GitHub MCP" vs. "MCP GitHub").</p><p><strong>Prerequisites:</strong></p><ul><li><p>Users with server installation privileges</p></li><li><p>Absence of verification systems for server identity</p></li><li><p>Relaxed organizational controls on tool installation</p></li></ul><p><strong>Plausibility Assessment:</strong> Highly plausible in current enterprise environments, particularly those prioritizing developer productivity over security governance. You can't just trust the name. </p><p><strong>Attacker ROI:</strong> Medium-high with minimal technical sophistication required. The investment is primarily in creating convincing lookalikes rather than complex technical exploits.</p><p><strong>Security Countermeasures:</strong> Implementing certificate-based verification and centralized MCP server registries could significantly reduce this attack vector's viability. The announced <a href="https://thehumblengineer.com/i/160757991/the-optimistic-future-of-mcp">Official registry API</a> should help counter this.</p><h3>Supply Chain Compromise</h3><p><strong>Attack Mechanics:</strong> Malicious code embedded in MCP server installers or dependencies, potentially delivering backdoors, credential stealers, or ransomware.</p><p><strong>Prerequisites:</strong></p><ul><li><p>Organizations using unofficial distribution channels</p></li><li><p>Inadequate installer verification processes</p></li><li><p>Absence of code signing requirements</p></li></ul><p><strong>Plausibility Assessment:</strong> Increasingly likely as MCP adoption grows. You run this script thinking you're just setting up a tool, but it installs something malicious in the background. This mirrors successful supply chain attacks against other developer tools like the <a href="https://www.wired.com/story/xz-backdoor-everything-you-need-to-know/">XZ Backdoor</a>. </p><p><strong>Attacker ROI:</strong> High, particularly for nation-state actors with long-term objectives. The initial effort to compromise distribution channels pays dividends across multiple victims, making this approach increasingly attractive compared to targeting individual organizations.</p><p><strong>Security Countermeasures:</strong> Rigorous code signing, Software Bill of Materials (SBOM) verification, integrity checking and previously mentioned <a href="https://thehumblengineer.com/i/160757991/the-optimistic-future-of-mcp">Official registry API</a> could substantially diminish this attack vector.</p><h2>Operational Attacks</h2><h3><a href="https://invariantlabs.ai/blog/mcp-security-notification-tool-poisoning-attacks">Tool Poisoning</a> Through Description Manipulation</h3><p><strong>Attack Mechanics:</strong> Hiding malicious instructions in tool descriptions that guide AI behaviour, creating an indirect prompt injection.</p><p><strong>Prerequisites:</strong></p><ul><li><p>Ability to modify tool descriptions (either through compromise or as a legitimate provider)</p></li><li><p>LLMs that trust and act on tool descriptions without verification</p></li><li><p>Lack of semantic scanning for suspicious description content</p></li></ul><p><strong>Plausibility Assessment:</strong> Moderately plausible and growing as a risk vector. It's invisible to the end user, making detection particularly challenging. The attack is especially concerning in "<a href="https://repello.ai/blog/mcp-tool-poisoning-to-rce?utm_source=chatgpt.com">rug pull</a>" scenarios where trusted tools later modify their descriptions.</p><p><strong>Attacker ROI:</strong> Currently moderate but increasing. This attack vector requires understanding AI behaviour but offers a unique ability to manipulate AI actions without traditional code execution. For sophisticated actors, this presents a novel and potentially valuable approach with limited detection risk.</p><p><strong>Security Countermeasures:</strong> Implementing description integrity verification and semantic analysis of tool descriptions could render this attack economically unviable.</p><p><strong>Tool Poisoning Security Checklist</strong></p><ul><li><p>Verify tool descriptions come from trusted sources</p></li><li><p>Implement integrity checking on tool metadata</p></li><li><p>Monitor for unexpected changes to tool descriptions</p></li><li><p>Limit AI access to only necessary tools</p></li><li><p>Require human approval for high-risk actions</p></li></ul><h3>Connected Service Token Theft: The Keys to Multiple Kingdoms</h3><p><strong>Attack Mechanics:</strong> When MCP tools connect to various services, they often use OAuth tokens or API credentials with broad permissions. If compromised, these provide access to multiple systems. If an attacker compromises an MCP server, they could potentially grab all the access tokens stored there.</p><p><strong>Prerequisites:</strong></p><ul><li><p>Initial MCP server compromise</p></li><li><p>Connected services using persistent authorization tokens</p></li><li><p>Inadequate token lifecycle management</p></li></ul><p><strong>Plausibility Assessment:</strong> Highly plausible once initial access is achieved. OAuth tokens can have long expire times or be refreshable. So an attacker could potentially maintain access long after the initial compromise. This represents perhaps the highest-value target within the MCP ecosystem.</p><p><strong>Attacker ROI:</strong> Extremely high, especially for targeted attacks against organizations with valuable intellectual property or sensitive data. The ability to leverage one compromise to access multiple systems creates a significant multiplier effect on the attack value.</p><p><strong>Security Countermeasures:</strong> Short-lived tokens, just-in-time credential issuance, and zero trust architectures could dramatically reduce the value of token theft.</p><h3>Sandbox Escape and Lateral Movement</h3><p><strong>Attack Mechanics:</strong> Breaking out of MCP tool restrictions to access the host system or wider network, using the AI agent as an entry point.</p><p><strong>Prerequisites:</strong></p><ul><li><p>Vulnerability in sandbox implementation or configuration</p></li><li><p>Exploitable weakness in permission boundaries</p></li><li><p>Ability to execute arbitrary code within the tool environment</p></li></ul><p><strong>Plausibility Assessment:</strong> Moderately difficult with modern sandboxing technologies like <a href="https://github.com/google/gvisor">Gvisor</a> or <a href="https://firecracker-microvm.github.io/">Firecracker</a> but increases significantly in poorly configured environments. The AI agent essentially becomes a beachhead.</p><p><strong>Attacker ROI:</strong> High effort but potentially very high reward, particularly for advanced persistent threats and nation-state actors. The technical sophistication required limits this approach to well-resourced attackers, but the payoff in terms of network access makes it worthwhile for select targets.</p><p><strong>Security Countermeasures:</strong> Hardware-level isolation, robust attestation, and ephemeral execution environments could make sandbox escapes economically impractical for all but the most sophisticated attackers.</p><h2>Update Phase Vulnerabilities</h2><h3>Post-Update Privilege Persistence</h3><p><strong>Attack Mechanics:</strong> Exploiting flawed update processes where old, overly permissive credentials remain valid after supposed security improvements.</p><p><strong>Prerequisites:</strong></p><ul><li><p>Inadequate credential rotation during updates</p></li><li><p>Lack of privilege verification post-update</p></li><li><p>Absence of permission auditing</p></li></ul><p><strong>Plausibility Assessment:</strong> Common in real-world systems where security teams believe they've remediated issues but haven't fully revoked previous access. "Due to a bug in the update script, the old, overly permissive credential still works," creating a false sense of security.</p><p><strong>Attacker ROI:</strong> Moderate effort for sustained access, particularly valuable for long-term intelligence gathering. This approach offers persistence with minimal additional exploitation required, making it highly efficient for ongoing operations.</p><p><strong>Security Countermeasures:</strong> Automated credential rotation, permission verification, and continuous monitoring could substantially reduce this attack vector's viability.</p><h3>Vulnerable Version Redeployment</h3><p><strong>Attack Mechanics:</strong> Exploiting organizations that accidentally reinstall older, vulnerable versions of MCP servers with known security flaws.</p><p><strong>Prerequisites:</strong></p><ul><li><p>Lack of version control processes</p></li><li><p>Cached or pinned dependencies to outdated versions</p></li><li><p>Absence of vulnerability scanning for deployed components</p></li></ul><p><strong>Plausibility Assessment:</strong> Increasingly common as MCP ecosystem complexity grows. "Users might accidentally roll back or reinstall an older version that has known security flaws," often due to compatibility requirements or automated tools using cached packages.</p><p><strong>Attacker ROI:</strong> Low effort once vulnerabilities are public, making this approach attractive for opportunistic attackers. This vector allows exploitation of known issues rather than developing new techniques, providing efficiency for less sophisticated threat actors.</p><p><strong>Security Countermeasures:</strong> Version pinning with security verification, automated vulnerability scanning, and dependency verification could make this attack economically unattractive.</p><h2>Plausibility Assessment: The Hierarchy of Threats</h2><p>Ranking current MCP attack vectors by their plausibility in typical enterprise environments:</p><p><strong>Highly Plausible Today:</strong></p><ol><li><p>Name collision/identity spoofing (low technical barrier, high success likelihood)</p></li><li><p>Installer spoofing (proven vector for developer tools)</p></li><li><p>Connected service token theft (following initial compromise)</p></li><li><p>Configuration drift leading to security degradation</p></li></ol><p><strong>Moderately Plausible:</strong></p><ol><li><p>Tool poisoning through description manipulation (requires specific knowledge)</p></li><li><p>Vulnerable version redeployment (common but dependent on environment)</p></li><li><p>Post-update privilege persistence (requires timing and observation)</p></li></ol><p><strong>Currently Less Plausible:</strong></p><ol><li><p>Sandbox escape (difficult with proper configuration)</p></li><li><p>Sophisticated backdoors (high development cost for limited targets)</p></li></ol><p>This hierarchy will evolve as both MCP adoption and security awareness increase. The most concerning pattern emerges when considering combined attacks; for example, using name collision to establish initial access, followed by token theft to expand reach.</p><h2>The Attacker's Calculus: Is MCP Worth Targeting?</h2><p>For cybercriminals considering where to invest their efforts, MCP presents an interesting risk-reward calculation that continues to evolve.</p><p>At present, MCP is not a prime target for the average cybercriminal. Although adoption is accelerating, it's still far from reaching the ubiquity of traditional attack surfaces like email, web apps, or Windows-based systems. This limited footprint reduces the short-term payoff for broad, opportunistic attacks.</p><p>Most cybercriminals continue to prioritize well-established vectors that offer faster and more predictable returns, such as:</p><ul><li><p>Exploiting vulnerable websites for quick monetization</p></li><li><p>Deploying ransomware against enterprises</p></li><li><p>Harvesting credentials through phishing campaigns</p></li><li><p>Engaging in cryptocurrency theft and fraud</p></li></ul><p>These established attack patterns currently offer more reliable returns for most threat actors. However, for targeted attackers - particularly those with specific objectives or longer-term goals - MCP becomes increasingly attractive.</p><h2>The Defence Evolution: How the Industry is Responding</h2><p>Despite these challenges, the security community is actively developing protection mechanisms. Industry efforts include:</p><ul><li><p>Community-maintained lists of vetted MCP servers</p></li><li><p>Evolving MCP specifications with explicit security guidance</p></li><li><p>Security vendors developing specialized protections</p></li><li><p>Open-source security tooling for MCP environments</p></li></ul><p>Companies like <a href="https://www.sentinelone.com/blog/avoiding-mcp-mania-how-to-secure-the-next-frontier-of-ai/">Sentinel One</a> and <a href="https://blog.cloudflare.com/remote-model-context-protocol-servers-mcp/">Cloudflare</a> are already developing specialized protection for MCP environments and built-in security features, recognizing its strategic importance in the security landscape.</p><h2>The Path Forward: Securing the AI Infrastructure</h2><p>As MCP potentially becomes a fundamental layer for AI interactions, organizations must approach its adoption with security as a foundational principle rather than an afterthought. The future security landscape for MCP will follow one of two divergent paths:</p><h4>Path 1: Security Lags Adoption (High Attacker ROI)</h4><p>If MCP follows the historical pattern of many technologies like IoT, with security as an afterthought or bolt-on consideration, several trends will drive increasing attack plausibility: automation will lower the technical barrier to exploitation, privileged access will expand as more sensitive systems integrate with MCP-enabled tools, and a security maturity gap will leave organizations vulnerable during the early phases of widespread adoption.</p><h4>Path 2: Security-First Approach (Low Attacker ROI)</h4><p>Alternatively, if the industry adopts a security-first approach to MCP implementation, a different trajectory emerges. A security-first approach to MCP implementation could significantly lower attacker ROI by embedding strong protections from the start, raising the cost and complexity for potential attackers.</p><h2>Conclusion: Balancing Innovation and Security</h2><p>The challenge ahead is formidable but essential: how do we collectively build a robust and trustworthy MCP ecosystem that enables innovation while ensuring security?</p><p>Unlike many previous technological shifts, we have the opportunity to address security before MCP becomes ubiquitous in critical systems. This presents a rare chance to maintain unfavourable economics for attackers even as adoption increases; but only if we act during this critical window before attack economics shift.</p><p>As adoption accelerates across industries, finding that balance will determine whether MCP becomes a transformative technology layer or yet another entry in the catalog of security cautionary tales.</p><p>The decisions made now about MCP security architecture will determine whether it becomes yet another high-ROI target for attackers or establishes a new paradigm where security fundamentals are built into the foundation of AI infrastructure.</p><p>Organizations that successfully navigate this challenge will:</p><ol><li><p>Embrace MCP's capabilities while implementing appropriate guardrails</p></li><li><p>Develop security expertise specific to AI-orchestrated interactions</p></li><li><p>Participate in the broader security community's efforts to establish standards</p></li><li><p>Maintain vigilance as the threat landscape evolves</p></li></ol><p>By understanding these emerging vulnerabilities today, security professionals can help shape a safer MCP ecosystem for tomorrow.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://thehumblengineer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Humbl Engineer's Journal! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Model Context Protocol ]]></title><description><![CDATA[Bridging the Gap Between AI and the Real World]]></description><link>https://thehumblengineer.com/p/model-context-protocol</link><guid isPermaLink="false">https://thehumblengineer.com/p/model-context-protocol</guid><dc:creator><![CDATA[The Humbl Engineer]]></dc:creator><pubDate>Tue, 22 Apr 2025 17:00:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rqml!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04b731a5-8fcd-4ea0-bc43-9eb3e434c0ca_456x311.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Model Context Protocol (MCP) has exploded onto the AI scene with remarkable speed. If you're in the tech industry, chances are you've already heard the acronym "MCP" mentioned, seen it discussed on social media, or read about it in industry publications. In a matter of months, this emerging standard has captured the attention of developers, enterprise architects, and AI researchers alike, becoming one of the most discussed technical innovations in the AI ecosystem.</p><p>But what exactly is driving this unprecedented level of interest and adoption? At its core, MCP addresses one of the most significant limitations of today's AI models: their isolation from real-time data and external systems. This revolutionary protocol is fundamentally changing how AI systems interact with information and tools, promising to unlock entirely new categories of AI applications.</p><h2>What is MCP and Why Does it Matter?</h2><p>At its core, <a href="https://modelcontextprotocol.io/introduction">MCP</a> is a standardized way for AI models to request and receive context from the outside world. In practice, this means an AI assistant can seamlessly integrate multiple capabilities; remembering your previous conversations, checking your current account balance, booking appointments on your calendar, or performing real-time research; all within a single, coherent interaction.</p><p>Before MCP emerged in late 2024, connecting AI models to external tools required custom integration work for each specific pairing of model and tool. This created what engineers call an "M&#215;T problem" (M models times T tools, each needing its own custom connector), resulting in fragmented architectures and significant development overhead. For a typical enterprise using just 5 AI models and 10 external tools, this meant maintaining 50 separate integration points; a <a href="https://norahsakal.com/blog/mcp-vs-api-model-context-protocol-explained/">maintenance burden</a> that often made comprehensive AI integration financially unfeasible.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rqml!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04b731a5-8fcd-4ea0-bc43-9eb3e434c0ca_456x311.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rqml!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04b731a5-8fcd-4ea0-bc43-9eb3e434c0ca_456x311.png 424w, https://substackcdn.com/image/fetch/$s_!rqml!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04b731a5-8fcd-4ea0-bc43-9eb3e434c0ca_456x311.png 848w, https://substackcdn.com/image/fetch/$s_!rqml!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04b731a5-8fcd-4ea0-bc43-9eb3e434c0ca_456x311.png 1272w, https://substackcdn.com/image/fetch/$s_!rqml!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04b731a5-8fcd-4ea0-bc43-9eb3e434c0ca_456x311.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rqml!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04b731a5-8fcd-4ea0-bc43-9eb3e434c0ca_456x311.png" width="456" height="311" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/04b731a5-8fcd-4ea0-bc43-9eb3e434c0ca_456x311.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:311,&quot;width&quot;:456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:203113,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://humblengineer.substack.com/i/160757991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04b731a5-8fcd-4ea0-bc43-9eb3e434c0ca_456x311.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rqml!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04b731a5-8fcd-4ea0-bc43-9eb3e434c0ca_456x311.png 424w, https://substackcdn.com/image/fetch/$s_!rqml!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04b731a5-8fcd-4ea0-bc43-9eb3e434c0ca_456x311.png 848w, https://substackcdn.com/image/fetch/$s_!rqml!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04b731a5-8fcd-4ea0-bc43-9eb3e434c0ca_456x311.png 1272w, https://substackcdn.com/image/fetch/$s_!rqml!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04b731a5-8fcd-4ea0-bc43-9eb3e434c0ca_456x311.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">MCP reduces the integration problem from MxT to M+T problem</figcaption></figure></div><h2>The Origin Story: Born from Necessity</h2><p>Unlike many technologies introduced through academic research, MCP emerged organically from engineering practices at <a href="https://wandb.ai/onlineinference/mcp/reports/The-Model-Context-Protocol-MCP-by-Anthropic-Origins-functionality-and-impact--VmlldzoxMTY5NDI4MQ">Anthropic</a>. While building infrastructure to help their AI assistant Claude maintain context, use tools effectively, and remember past interactions, engineers noticed recurring patterns in their architecture.</p><p>These patterns - consistent ways of routing memory, invoking tools, and managing message context - eventually crystallized into what we now know as the Model Context Protocol. It became the invisible connective tissue linking AI models with the information they need, when they need it.</p><p>What's remarkable is how quickly MCP has gone from an internal engineering practice to one of the most discussed topics in AI development. In just months, it's become a focal point for discussions about AI architecture, with companies racing to implement their own versions and share their approaches.</p><h2>How MCP Works: Architecture and Flow</h2><p>MCP systems typically consist of several key components:</p><p>1. <strong>MCP Server</strong>: The central router that receives context requests and coordinates responses</p><p>2. <strong>Client Applications</strong>: Language models, user-facing apps, or other systems needing contextual information</p><p>3. <strong>Context Providers</strong>: Specialized modules supplying different types of information (user data, tool outputs, etc.)</p><p>4. <strong>Messaging Layer</strong>: Enabling real-time communication between <a href="https://modelcontextprotocol.io/specification/2025-03-26/basic/architecture">components</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!w0EN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa27b1db6-7c48-41c3-9ed2-ad64aee2cb44_362x169.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!w0EN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa27b1db6-7c48-41c3-9ed2-ad64aee2cb44_362x169.webp 424w, https://substackcdn.com/image/fetch/$s_!w0EN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa27b1db6-7c48-41c3-9ed2-ad64aee2cb44_362x169.webp 848w, https://substackcdn.com/image/fetch/$s_!w0EN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa27b1db6-7c48-41c3-9ed2-ad64aee2cb44_362x169.webp 1272w, https://substackcdn.com/image/fetch/$s_!w0EN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa27b1db6-7c48-41c3-9ed2-ad64aee2cb44_362x169.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!w0EN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa27b1db6-7c48-41c3-9ed2-ad64aee2cb44_362x169.webp" width="362" height="169" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a27b1db6-7c48-41c3-9ed2-ad64aee2cb44_362x169.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:169,&quot;width&quot;:362,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:13480,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://humblengineer.substack.com/i/160757991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa27b1db6-7c48-41c3-9ed2-ad64aee2cb44_362x169.webp&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!w0EN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa27b1db6-7c48-41c3-9ed2-ad64aee2cb44_362x169.webp 424w, https://substackcdn.com/image/fetch/$s_!w0EN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa27b1db6-7c48-41c3-9ed2-ad64aee2cb44_362x169.webp 848w, https://substackcdn.com/image/fetch/$s_!w0EN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa27b1db6-7c48-41c3-9ed2-ad64aee2cb44_362x169.webp 1272w, https://substackcdn.com/image/fetch/$s_!w0EN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa27b1db6-7c48-41c3-9ed2-ad64aee2cb44_362x169.webp 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">MCP Architecture component</figcaption></figure></div><p>In a typical interaction, an AI model might ask the MCP server for relevant context about a user's situation. The server gathers precisely what's needed from various sources and returns only the essential information, allowing the AI to provide a contextualized, helpful response.</p><h2>MCP vs. Traditional APIs: A New Paradigm</h2><p>MCP represents a fundamental shift from how we've traditionally connected systems. As <a href="https://norahsakal.com/blog/mcp-vs-api-model-context-protocol-explained/">Norah Sakal</a> points out in her analysis, standard APIs handle isolated function calls in a transactional and stateless manner, while MCP operates with persistent context awareness:</p><p>While APIs deliver specific pieces of information in isolation, MCP orchestrates context across a dynamic landscape of memory, tools, and interactions&#8212;providing a complete picture for more helpful assistance.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9oeA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac996db3-ec44-40ca-944d-11999c5b504d_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9oeA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac996db3-ec44-40ca-944d-11999c5b504d_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!9oeA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac996db3-ec44-40ca-944d-11999c5b504d_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!9oeA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac996db3-ec44-40ca-944d-11999c5b504d_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!9oeA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac996db3-ec44-40ca-944d-11999c5b504d_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9oeA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac996db3-ec44-40ca-944d-11999c5b504d_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ac996db3-ec44-40ca-944d-11999c5b504d_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:372277,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://humblengineer.substack.com/i/160757991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac996db3-ec44-40ca-944d-11999c5b504d_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9oeA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac996db3-ec44-40ca-944d-11999c5b504d_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!9oeA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac996db3-ec44-40ca-944d-11999c5b504d_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!9oeA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac996db3-ec44-40ca-944d-11999c5b504d_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!9oeA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac996db3-ec44-40ca-944d-11999c5b504d_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><strong>Source:</strong> https://norahsakal.com/blog/mcp-vs-api-model-context-protocol-explained/</figcaption></figure></div><h2>The Business Case: Why Organizations Need MCP</h2><p>For organizations deploying AI, MCP delivers transformative value across multiple dimensions. The protocol enables remarkable integration efficiency by allowing companies to connect AI models to existing tools and data once, eliminating the need to build custom connectors for each specific use case. This approach ensures consistent memory, as AI assistants can now reliably access and maintain important context across different interactions and platforms.</p><p>MCP also addresses the critical challenge of real-time accuracy. Rather than relying on potentially outdated training data, AI systems can access up-to-date information at the moment of interaction. This capability leads directly to improved user experiences through more contextually aware and personalized AI interactions. Organizations also gain valuable future-proofing <a href="https://modelcontextprotocol.io/introduction#applications">benefits</a>, as they can swap or upgrade AI models without rebuilding their entire integration stack.</p><p>By providing a standardized way for AI to access contextual information, MCP helps organizations extract significantly more value from both their AI investments and existing data infrastructure.</p><h2>MCP Security: Challenges and Solutions</h2><p>Like any transformative technology in its early stages, MCP introduces important security considerations that are being actively addressed:</p><h3>Key Security Challenges</h3><p>The rapid growth of MCP adoption has necessitated careful attention to security considerations. <strong>Context leakage</strong> represents a significant concern, as persistent contexts may store <em>sensitive</em> <em>information</em> that could be exposed if not properly handled. Similarly, <strong>prompt injection attacks</strong> present another vulnerability, where malicious inputs could potentially bypass intended behaviours or moderation filters.</p><p><strong>Session management</strong> emerges as a critical area requiring robust implementation, as improper handling could enable <strong>session hijacking or replay attacks</strong> that compromise system integrity. The centralized nature of MCP servers creates an additional security dimension, as these components can become <em>high-value targets for attackers</em> seeking to gain broad access to connected systems. Finally, <strong>supply chain</strong> concerns remain paramount, with organizations needing assurance about the integrity and provenance of MCP server deployments.</p><blockquote><h4>OAuth in Plain Language</h4><p>OAuth is like a hotel key card system for digital services:</p><p>1. <strong>Without OAuth</strong>: You'd need to give your actual home key to every service you use, giving them full access to your house.</p><p>2. <strong>With OAuth</strong>: You give services a specialized "key card" that only works for specific rooms and expires after a set time.</p><p>In MCP, OAuth helps control which tools and data sources an AI can access on your behalf, without requiring you to share your actual passwords or credentials with the AI system itself.</p></blockquote><h2>Enterprise-Grade Solutions Emerging</h2><p>The security landscape for MCP is improving dramatically:</p><p>1. <strong>Authentication Evolution</strong>: While Christian Posta noted that "The MCP OAuth specification blurs the distinction between a 'resource server' and an 'authorization server'", the community is actively working to better align MCP with enterprise identity standards.</p><p>2. <strong>Managed Security Controls</strong>: Providers like Cloudflare now offer built-in security features:</p><p>    - OAuth implementation specifically designed for MCP</p><p>    - Rate limiting to prevent abuse</p><p>    - Cost controls for automated access</p><p>    - Verification mechanisms</p><h2>Practical Security Recommendations</h2><p>Organizations implementing MCP should integrate several security practices into their deployment strategies. Strong authentication forms the foundation, with leading implementers using short-lived JSON Web Tokens (JWTs) and implement refresh token rotation. This approach significantly reduces the risk window for compromised credentials.</p><p>Equally important is enforcing least privilege principles throughout the MCP stack. Security experts recommend creating purpose-specific service accounts for each MCP context provider, with permissions scoped precisely to the minimum data access required. For example, a customer data provider should only access customer records, not broader organizational data.</p><p>Context transparency mechanisms provide another critical security layer. Enterprise implementations now commonly include context logging systems that record which context was injected, when, and at whose request; creating an audit trail that security teams can monitor for anomalies. Tool sandboxing techniques isolate external tools to prevent lateral movement within systems, typically implemented through containerization or function-based isolation. Finally, regular security audits should be scheduled, with specialized focus on MCP-specific vulnerabilities and potential context leakage patterns.</p><h2>MCP in the Ecosystem: Relation to RAG and A2A</h2><p>MCP exists within a broader ecosystem of AI integration technologies, forming part of an emerging technical stack rather than standing in isolation. Understanding how these technologies complement each other helps organizations build more comprehensive AI architectures.</p><p><strong>Retrieval-Augmented Generation</strong> (RAG) and MCP serve different but complementary purposes in the AI stack. While RAG specifically enhances AI outputs by pulling relevant information from knowledge bases during generation, MCP provides a universal framework for all types of contextual exchanges. In practice, many organizations implement RAG as one type of context provider within their broader MCP architecture.</p><p>Similarly, the <strong>Agent-to-Agent Protocol (A2A)</strong> addresses a different dimension of AI integration than MCP. Where MCP manages context exchange between models and external systems, A2A protocols focus on standardizing communication between different AI agents. The complementary nature becomes evident in multi-agent systems, where MCP typically handles the contextual grounding (connecting agents to real-world data) while A2A manages the inter-agent coordination patterns.</p><p>A key strength of MCP's architecture lies in its modular nature; organizations can incorporate these and other approaches as components within their MCP implementation, creating a unified integration layer that spans multiple AI technologies without redundant integration efforts.</p><h2>The Optimistic Future of MCP</h2><p>The trajectory of MCP development points toward a rapidly evolving future with transformative potential for AI integration. Among the most anticipated developments is the <strong>Official MCP Registry System</strong>. This system will offer centralized registries for MCP servers with cryptographic verification mechanisms, version pinning, and trust validation chains; directly addressing the supply chain vulnerabilities highlighted in security research.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2Ci4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fb54d96-33d8-446a-a4f8-3fabd38ee677_2154x1148.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2Ci4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fb54d96-33d8-446a-a4f8-3fabd38ee677_2154x1148.png 424w, https://substackcdn.com/image/fetch/$s_!2Ci4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fb54d96-33d8-446a-a4f8-3fabd38ee677_2154x1148.png 848w, https://substackcdn.com/image/fetch/$s_!2Ci4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fb54d96-33d8-446a-a4f8-3fabd38ee677_2154x1148.png 1272w, https://substackcdn.com/image/fetch/$s_!2Ci4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fb54d96-33d8-446a-a4f8-3fabd38ee677_2154x1148.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2Ci4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fb54d96-33d8-446a-a4f8-3fabd38ee677_2154x1148.png" width="1456" height="776" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9fb54d96-33d8-446a-a4f8-3fabd38ee677_2154x1148.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:776,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:695914,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://humblengineer.substack.com/i/160757991?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fb54d96-33d8-446a-a4f8-3fabd38ee677_2154x1148.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2Ci4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fb54d96-33d8-446a-a4f8-3fabd38ee677_2154x1148.png 424w, https://substackcdn.com/image/fetch/$s_!2Ci4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fb54d96-33d8-446a-a4f8-3fabd38ee677_2154x1148.png 848w, https://substackcdn.com/image/fetch/$s_!2Ci4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fb54d96-33d8-446a-a4f8-3fabd38ee677_2154x1148.png 1272w, https://substackcdn.com/image/fetch/$s_!2Ci4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fb54d96-33d8-446a-a4f8-3fabd38ee677_2154x1148.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: <a href="https://www.youtube.com/watch?v=kQmXtrmQ5Zg&amp;t=2311s">Building Agents with Model Context Protocol - Full Workshop with Mahesh Murag of Anthropic</a></figcaption></figure></div><p>Security standardization is accelerating across the ecosystem. What began as proprietary security implementations by early providers like <strong><a href="https://blog.cloudflare.com/remote-model-context-protocol-servers-mcp/">Cloudflare</a></strong> is evolving into a comprehensive security framework with consistent controls and best practices. </p><p>The remarkable pace of these developments - compressing what would typically be years of standards evolution into months - stems from unprecedented industry collaboration around MCP. </p><h2>From Pattern to Protocol</h2><p>While MCP is not yet a formal industry standard, it is quickly evolving from an internal design pattern into something much broader. Its modular architecture and growing adoption suggest it <em>could</em> become a de facto standard for context management in AI systems. The recent endorsement by Sam Altman and OpenAI; highlighting upcoming MCP support across products like the ChatGPT desktop app and <a href="https://openai.github.io/openai-agents-python/mcp/">Agents SDK</a>; is a major step in that direction, signalling momentum toward broader standardization.</p><h2>Conclusion: The Secure Foundation for AI's Future</h2><p>The Model Context Protocol represents much more than a technical specification; it fundamentally reshapes how AI systems interact with the world around them. By solving the context problem while actively addressing security concerns, MCP has rapidly evolved from experimental concept to enterprise-ready protocol in less than a year.</p><p>For organizations building AI capabilities today, implementing MCP could represent the difference between creating isolated, limited AI experiences and developing truly transformative cognitive systems that seamlessly integrate with digital ecosystems. The protocol's rapid security evolution and growing ecosystem of tools suggest that early adopters will gain significant advantages in both implementation efficiency and capability deployment.</p><p>As AI becomes increasingly central to business operations and customer experiences, MCP is positioned to be the connective tissue that brings context, intelligence, and real-world awareness together; establishing a secure foundation for the next generation of AI applications.</p><p><em>Are you implementing MCP in your organization? What challenges and opportunities are you encountering? Share your experiences in the comments below.</em></p><h2></h2><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://thehumblengineer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Humble Engineer's Journal! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Handling Workplace Conflicts: A Practical Guide]]></title><description><![CDATA[Practical Strategies for Navigating Office Politics with Professionalism]]></description><link>https://thehumblengineer.com/p/handling-workplace-conflicts-a-practical</link><guid isPermaLink="false">https://thehumblengineer.com/p/handling-workplace-conflicts-a-practical</guid><dc:creator><![CDATA[The Humbl Engineer]]></dc:creator><pubDate>Wed, 16 Apr 2025 19:40:34 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4HG7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17bc1213-0d4a-492c-96ae-d84fadff4261_1918x1192.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>According to a <a href="https://www.shrm.org/topics-tools/news/all-things-work/reducing-employee-conflict">workplace study</a>, managers spend an average of 4.3 hours per week handling employee conflicts; that's over 200 hours annually. We've all been there. No matter how positive your workplace culture, politics and conflicts inevitably find their way in, especially as teams grow. While small, tight-knit groups might avoid these issues for a while, knowing how to navigate conflicts professionally is an essential skill.</p><h2>The Art of Conflict Resolution</h2><p>Not all conflicts require the same approach. Sometimes it's best to let minor issues go, while others demand direct confrontation. The key is analyzing each situation carefully and responding appropriately.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://thehumblengineer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Humbl Engineer's Journal! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4HG7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17bc1213-0d4a-492c-96ae-d84fadff4261_1918x1192.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4HG7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17bc1213-0d4a-492c-96ae-d84fadff4261_1918x1192.png 424w, https://substackcdn.com/image/fetch/$s_!4HG7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17bc1213-0d4a-492c-96ae-d84fadff4261_1918x1192.png 848w, https://substackcdn.com/image/fetch/$s_!4HG7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17bc1213-0d4a-492c-96ae-d84fadff4261_1918x1192.png 1272w, https://substackcdn.com/image/fetch/$s_!4HG7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17bc1213-0d4a-492c-96ae-d84fadff4261_1918x1192.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4HG7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17bc1213-0d4a-492c-96ae-d84fadff4261_1918x1192.png" width="1456" height="905" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/17bc1213-0d4a-492c-96ae-d84fadff4261_1918x1192.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:905,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1873545,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://humblengineer.substack.com/i/160632624?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17bc1213-0d4a-492c-96ae-d84fadff4261_1918x1192.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4HG7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17bc1213-0d4a-492c-96ae-d84fadff4261_1918x1192.png 424w, https://substackcdn.com/image/fetch/$s_!4HG7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17bc1213-0d4a-492c-96ae-d84fadff4261_1918x1192.png 848w, https://substackcdn.com/image/fetch/$s_!4HG7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17bc1213-0d4a-492c-96ae-d84fadff4261_1918x1192.png 1272w, https://substackcdn.com/image/fetch/$s_!4HG7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17bc1213-0d4a-492c-96ae-d84fadff4261_1918x1192.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">As seen in Good Will Hunting (1997) &#8211; &#8220;It&#8217;s not your fault.&#8221;</figcaption></figure></div><p>Let's examine two common workplace scenarios and practical ways to address them:</p><h3>Scenario 1: When a Colleague Uses Unprofessional Language</h3><p>A team member speaks to you unprofessionally, possibly due to frustration about something unrelated.</p><p><strong>The effective approach:</strong></p><ol><li><p><strong>Assess the situation</strong> - Don't immediately assume negative intent</p></li><li><p><strong>Consider context</strong> - If it's out of character and a one-time occurrence, consider letting it go</p></li><li><p><strong>Document carefully</strong> - For repeated behavior, save emails, screenshots of chats, or notes from conversations</p></li><li><p><strong>Address directly</strong> - Speak privately: "I found our recent interaction unprofessional and it made me uncomfortable. I'd appreciate if we could communicate more respectfully."</p></li><li><p><strong>Set boundaries</strong> - If the behavior continues despite your conversation, clearly state you may need to escalate</p></li><li><p><strong>Escalate appropriately</strong> - Only as a last resort, report to management with your documentation</p></li></ol><h3>Scenario 2: Dealing with Credit-Seekers</h3><p>Someone consistently seeks recognition for even minor contributions, potentially disrupting team dynamics.</p><p><strong>The effective approach:</strong></p><ol><li><p><strong>Understand the root cause</strong> - Recognize this often stems from insecurity or past experiences</p></li><li><p><strong>Focus on systems</strong> - Focus on the underlying issue, not who&#8217;s at fault; treat the cause, not just the reaction.</p></li><li><p><strong>Establish guidelines</strong> - Work with leadership to create clear credit attribution protocols</p></li><li><p><strong>Implement fair recognition</strong> - Propose a balanced approach: those who contribute significantly receive formal credit, while still acknowledging everyone's input</p></li><li><p><strong>Model good behaviour</strong> - Demonstrate generous credit-giving in your own communications</p></li></ol><h2>Prevention: Better Than Cure</h2><p>Preventing conflicts is always preferable to resolving them. Consider these proactive approaches:</p><ol><li><p><strong>Clarify expectations</strong> early in projects about roles, responsibilities, and recognition</p></li><li><p><strong>Establish communication norms</strong> that encourage respectful, direct feedback</p></li><li><p><strong>Create psychological safety</strong> where team members can voice concerns before they escalate</p></li><li><p><strong>Schedule regular check-ins</strong> to address minor issues before they grow</p></li></ol><h2>When You're the Manager</h2><p>Team leaders face unique challenges in conflict resolution:</p><ul><li><p><strong>Stay neutral</strong> - Avoid taking sides before understanding all perspectives</p></li><li><p><strong>Focus on behaviour</strong> rather than personalities or assumptions</p></li><li><p><strong>Establish clear team norms</strong> around communication and credit-sharing</p></li><li><p><strong>Address patterns</strong> rather than isolated incidents when possible</p></li></ul><h2>The Bottom Line</h2><p>Workplace conflicts are inevitable. By focusing on issues rather than individuals, addressing problems directly but respectfully, and establishing clear guidelines, you can protect team culture while resolving tensions effectively.</p><p><strong>Ask yourself:</strong> "Am I trying to win this conflict or resolve it?" The answer makes all the difference.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!81id!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b05ce07-cf15-4c73-839d-b00c5345a9c1_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!81id!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b05ce07-cf15-4c73-839d-b00c5345a9c1_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!81id!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b05ce07-cf15-4c73-839d-b00c5345a9c1_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!81id!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b05ce07-cf15-4c73-839d-b00c5345a9c1_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!81id!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b05ce07-cf15-4c73-839d-b00c5345a9c1_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!81id!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b05ce07-cf15-4c73-839d-b00c5345a9c1_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4b05ce07-cf15-4c73-839d-b00c5345a9c1_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2526802,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://humblengineer.substack.com/i/160632624?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b05ce07-cf15-4c73-839d-b00c5345a9c1_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!81id!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b05ce07-cf15-4c73-839d-b00c5345a9c1_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!81id!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b05ce07-cf15-4c73-839d-b00c5345a9c1_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!81id!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b05ce07-cf15-4c73-839d-b00c5345a9c1_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!81id!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b05ce07-cf15-4c73-839d-b00c5345a9c1_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Generated with AI</figcaption></figure></div><p>Remember: The goal isn't winning conflicts, but resolving them in ways that strengthen your team and workplace.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://thehumblengineer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Humbl Engineer's Journal! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Biggest Fallacy in Tech: "My Work Will Speak for Itself"]]></title><description><![CDATA[Technical Skills Get You Hired, Communication Gets You Promoted]]></description><link>https://thehumblengineer.com/p/the-biggest-fallacy-in-tech-my-work</link><guid isPermaLink="false">https://thehumblengineer.com/p/the-biggest-fallacy-in-tech-my-work</guid><dc:creator><![CDATA[The Humbl Engineer]]></dc:creator><pubDate>Fri, 11 Apr 2025 18:01:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Xgkt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a2cb6d-3679-4907-a015-96ef32e77b83_1600x1148.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Why does the quietest genius remain invisible while their "good enough" colleague gets promoted? For years, I've watched brilliant technical minds stagnate while seemingly less talented peers accelerate past them. The difference wasn't technical ability; it was mastery of the hidden language that no bootcamp teaches. What if I told you that the phrase "let your work speak for itself" might be the most destructive career advice in tech?</p><blockquote><p>In tech, it&#8217;s not always the sharpest mind that leads; it&#8217;s often the clearest voice.</p></blockquote><h2>The Silent Specialist Syndrome</h2><p>For years, I lived by this unspoken rule of technical fields: if I kept my head down, analyzed complex threats, and delivered projects better than anyone else, I'd naturally stand out. I believed my technical excellence would shine so brightly that recognition would inevitably follow.</p><p>I was fortunate - truly fortunate - to work with supportive teams where my peers and managers recognized my contributions. Not everyone has that luxury. Despite that at different points in my career I was clearly underpaid.</p><div class="pullquote"><p>Between 2023 and 2024, I surveyed over 2400 workers around the world, spanning industries, job titles, and years of experience. Through this work, I learned that feeling underappreciated can come in many forms, but largely, it manifests from lapses in communication between managers and their team members. - Tessa West, <a href="https://hbr.org/2024/07/why-you-feel-underappreciated-at-work">Harvard Business Review</a></p></div><p>I can't help but wonder: what if I had understood the value of communication earlier? Could I have accelerated my growth? </p><h2>Technical Skill: The Entry Ticket, Not The Main Event</h2><p>Think of technical skill as your entry ticket to the room; essential and non-negotiable. But once inside, what keeps you in meaningful conversations is your ability to communicate ideas, collaborate effectively, and bring stakeholders along with your thinking. This combination of technical prowess and communication skill is what propels careers forward.</p><h2>A Tale of Two Technologists: Numbers Don't Lie</h2><p>I've seen this play out countless times. Consider Alex and Jordan, both exceptional technologists:</p><ul><li><p><strong>Alex</strong>: Near-perfect technical abilities but minimal communication skills. Remained in the same position for five years despite solving the team's most complex problems. Performance reviews consistently noted "needs to improve visibility of contributions."</p></li><li><p><strong>Jordan</strong>: Technically competent (top 25% but not top 10%) with excellent communication skills. Advanced to senior positions within three years, led multiple high-impact projects, and received a 35% higher salary than peers at the same experience level.</p></li></ul><p>Jordan didn't need to be the absolute best coder; they just needed to be good enough and capable of articulating their value clearly.</p><h2>The Silent Cost: When Brilliance Goes Unheard</h2><p>Let me say something that took me too long to learn: If you can't make people understand your ideas, they might as well not exist.</p><div class="pullquote"><p>Consider <a href="https://web.stanford.edu/dept/SUL/sites/mac/parc.html#:~:text=The%20closest%20thing%20in%20the,had%20been%20developed%20at%20PARC.">Xerox PARC</a>, a goldmine of innovation. Its engineers developed groundbreaking technologies like the graphical user interface, the computer mouse, and early networking concepts. Their fatal flaw? <strong>They couldn't effectively communicate the value of what they had built; not to decision-makers, not to the market.</strong></p><p>Then came Steve Jobs. He saw the potential immediately, <strong>translated the tech into a compelling vision</strong>, and brought it to the world through Apple. The result? Apple revolutionized personal computing while Xerox, despite inventing the future, was left behind.</p><blockquote><p><strong>The lesson is clear: Building great things isn't enough; you must help others see their greatness.</strong></p></blockquote></div><p>How many brilliant solutions have died in design meetings because their creator couldn't explain them clearly? How many weeks have you spent perfecting features only to have someone else receive credit because you didn't effectively communicate your contribution? Without clear articulation of your work and its value, all that effort goes unnoticed, unappreciated, unrewarded.</p><h2>The Strategic Investment: Where Your Learning Hours Count Most</h2><p>Technical skill development follows the <a href="http://Have You Hit the Point of Diminishing Returns as a Developer?">law of diminishing returns</a>.  </p><p>Consider this: moving from 85% to 86% technical proficiency might require 20 hours of work. That same 20 hours invested in communication skills could take you from 40% to 60% proficiency&#8212;a much higher return on investment.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Xgkt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a2cb6d-3679-4907-a015-96ef32e77b83_1600x1148.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Xgkt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a2cb6d-3679-4907-a015-96ef32e77b83_1600x1148.png 424w, https://substackcdn.com/image/fetch/$s_!Xgkt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a2cb6d-3679-4907-a015-96ef32e77b83_1600x1148.png 848w, https://substackcdn.com/image/fetch/$s_!Xgkt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a2cb6d-3679-4907-a015-96ef32e77b83_1600x1148.png 1272w, https://substackcdn.com/image/fetch/$s_!Xgkt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a2cb6d-3679-4907-a015-96ef32e77b83_1600x1148.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Xgkt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a2cb6d-3679-4907-a015-96ef32e77b83_1600x1148.png" width="1456" height="1045" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/81a2cb6d-3679-4907-a015-96ef32e77b83_1600x1148.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1045,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:66849,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://humblengineer.substack.com/i/160740148?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a2cb6d-3679-4907-a015-96ef32e77b83_1600x1148.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Xgkt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a2cb6d-3679-4907-a015-96ef32e77b83_1600x1148.png 424w, https://substackcdn.com/image/fetch/$s_!Xgkt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a2cb6d-3679-4907-a015-96ef32e77b83_1600x1148.png 848w, https://substackcdn.com/image/fetch/$s_!Xgkt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a2cb6d-3679-4907-a015-96ef32e77b83_1600x1148.png 1272w, https://substackcdn.com/image/fetch/$s_!Xgkt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F81a2cb6d-3679-4907-a015-96ef32e77b83_1600x1148.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Wikipedia</figcaption></figure></div><p>When you reach this plateau, diverting even a portion of your learning efforts toward communication can dramatically increase your overall impact:</p><ul><li><p>You explain complex concepts with clarity</p></li><li><p>You influence key decisions</p></li><li><p>You lead teams more effectively</p></li><li><p>You receive proper credit for your work</p></li><li><p>You inspire confidence in stakeholders</p></li></ul><h2>Your Future Self Will Thank You</h2><p>Consider your long-term career trajectory. Today you might be a junior developer or security analyst, but where will you be in five years? Ten? Many of us will become tech leads, principal engineers, security directors, CTOs, or founders. </p><p>As professionals move into executive roles, communication emerges as one of the most critical skills across the C-suite. According to an <a href="https://hbr.org/2022/07/the-c-suite-skills-that-matter-most">HBR analysis</a>, even in technical leadership positions, it&#8217;s not just about what you know; but how clearly you can articulate it, align teams, and influence outcomes. The higher you go, the more your impact depends on your ability to connect, not just code.</p><p>Regardless of which path you choose, your ability to communicate effectively will determine whether your ideas are heard, your work recognized, and your leadership trusted.</p><h2>Communication: The Career Multiplier</h2><p>Don't fall into the trap I did, believing that technical excellence alone will carry you forward. Your communication skill isn't just important; it's the multiplier that determines your ultimate impact.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QURG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe114dc-b039-4a53-8eab-4bd1927c6ae4_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QURG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe114dc-b039-4a53-8eab-4bd1927c6ae4_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!QURG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe114dc-b039-4a53-8eab-4bd1927c6ae4_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!QURG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe114dc-b039-4a53-8eab-4bd1927c6ae4_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!QURG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe114dc-b039-4a53-8eab-4bd1927c6ae4_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QURG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe114dc-b039-4a53-8eab-4bd1927c6ae4_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9fe114dc-b039-4a53-8eab-4bd1927c6ae4_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2575352,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://humblengineer.substack.com/i/160740148?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe114dc-b039-4a53-8eab-4bd1927c6ae4_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QURG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe114dc-b039-4a53-8eab-4bd1927c6ae4_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!QURG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe114dc-b039-4a53-8eab-4bd1927c6ae4_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!QURG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe114dc-b039-4a53-8eab-4bd1927c6ae4_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!QURG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9fe114dc-b039-4a53-8eab-4bd1927c6ae4_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Generated with AI</figcaption></figure></div><p>Even for deeply technical roles, communication matters. A <a href="https://www.mckinsey.com/capabilities/people-and-organizational-performance/our-insights/why-leadership-development-programs-fail">McKinsey report </a>highlights that technical professionals who develop strong communication and interpersonal skills are significantly more likely to advance into leadership roles. Similarly, a study published in the <em><a href="https://ascelibrary.org/doi/10.1061/EGISBD.0000465">Journal of Engineering Education</a></em> found that engineers who communicate their work effectively are more likely to receive cross-functional support, funding, and visibility; factors essential for project continuation and career growth.</p><blockquote><p>In tech, the loudest voice in the room often gets heard before the smartest one. The real edge? Being both.</p></blockquote><h2>The Counterargument: "But I Just Want to Code"</h2><p>Some argue that certain technical roles simply don't require communication skills; that pure technical excellence should be enough. The data suggests otherwise.</p><div class="pullquote"><p>"Pull requests that include clear explanations and active comment engagement are significantly more likely to be accepted. Developers who explain their intent, respond constructively to feedback, and maintain open dialogue increase their chances of merging their contributions, whereas silence or poor communication can lead to rejection&#8212;even when the code is of high quality."&#8212; Adapted from Gousios et al. (2014), Tsay et al. (2014), and Bosu et al. (2015)</p></div><p>Even if you never speak to clients or give presentations, your ability to document your work, explain your approach, and justify your decisions remains essential.</p><h3>Skills That Stand the Test of Time</h3><p>In the end, communication skills aren&#8217;t just &#8220;nice to have&#8221;; they&#8217;re <strong>life skills</strong>. Whether you're presenting a technical idea, navigating a difficult conversation, or leading a team, these skills will follow you for the rest of your life; <strong>personally and professionally</strong>.</p><p>Technical tools change. Roles evolve. Entire industries shift. AI might automate or replace parts of your current skill set. But the ability to <strong>listen, persuade, explain, and connect</strong>? That&#8217;s timeless.</p><blockquote><p><strong>Let your work speak for itself&#8212;but amplify it by speaking alongside it.</strong></p></blockquote><p>Communication isn't just for now; it's your insurance policy for whatever comes next. The question isn't whether you can afford to develop these skills; it's whether you can afford not to.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://thehumblengineer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Humble Engineer's Journal! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Think You Need a Startup to Get Rich? Think Again.]]></title><description><![CDATA[Building Wealth Your Way]]></description><link>https://thehumblengineer.com/p/think-you-need-a-startup-to-get-rich</link><guid isPermaLink="false">https://thehumblengineer.com/p/think-you-need-a-startup-to-get-rich</guid><dc:creator><![CDATA[The Humbl Engineer]]></dc:creator><pubDate>Mon, 07 Apr 2025 18:01:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wJep!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cfc0fb0-a817-4bc1-8d60-58ca75d45a56_1024x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>When people think about increasing their income, the default assumption is often: <em>I need to start my own business.</em> While entrepreneurship can be an incredible path for some, it's not the only way to achieve financial freedom; and for many, it's not even the best way.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wJep!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cfc0fb0-a817-4bc1-8d60-58ca75d45a56_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wJep!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cfc0fb0-a817-4bc1-8d60-58ca75d45a56_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!wJep!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cfc0fb0-a817-4bc1-8d60-58ca75d45a56_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!wJep!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cfc0fb0-a817-4bc1-8d60-58ca75d45a56_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!wJep!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cfc0fb0-a817-4bc1-8d60-58ca75d45a56_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wJep!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cfc0fb0-a817-4bc1-8d60-58ca75d45a56_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5cfc0fb0-a817-4bc1-8d60-58ca75d45a56_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1613921,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://humblengineer.substack.com/i/160555195?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cfc0fb0-a817-4bc1-8d60-58ca75d45a56_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wJep!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cfc0fb0-a817-4bc1-8d60-58ca75d45a56_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!wJep!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cfc0fb0-a817-4bc1-8d60-58ca75d45a56_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!wJep!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cfc0fb0-a817-4bc1-8d60-58ca75d45a56_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!wJep!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5cfc0fb0-a817-4bc1-8d60-58ca75d45a56_1024x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: Generated with AI</figcaption></figure></div><p>In reality, there are multiple paths to building wealth and creating a more fulfilling professional life:</p><ul><li><p>A <strong>side hustle</strong> that brings in extra income and diversifies your skill set.</p></li><li><p><strong>Entrepreneurship</strong>: starting your own business or startup.</p></li><li><p>Building <strong>passive income streams</strong> through investments, content, or digital products.</p></li><li><p><strong>Skilling up</strong> within your current job to earn promotions, raises, or higher-paying roles elsewhere.</p></li></ul><p>All of these are valid - and potentially lucrative - options. The "right" path depends on <em>your unique situation</em>: your current job, lifestyle, goals, risk tolerance, and interests.</p><h2>You Don't <em>Necessarily</em> <em>Have</em> to Quit Your Day Job</h2><p>One persistent myth? That financial freedom requires abandoning the 9-to-5 world. You can find opportunity, autonomy, and serious earning potential right where you are - especially if you're in a company that supports growth and advancement.</p><p><em>Doug McMillon began his career at Walmart in 1984 as a teenager, working part-time unloading trucks at a distribution center for $6.50 an hour. Over the years, he took on roles such as assistant store manager, buyer in merchandising, and CEO of Sam's Club. In 2014, after decades of climbing the corporate ladder, he became the CEO of Walmart. McMillon credits his rise to taking on diverse roles within the company and continuously learning from each position</em> <em>- <a href="https://quartr.com/insights/business-philosophy/doug-mcmillon-walmarts-ceo-decades-in-the-making">Doug McMillon: Walmart's CEO, Decades in the Making</a></em></p><p>If you're stuck in a toxic workplace, significantly underpaid, or no longer developing professionally, it might be time to move on. But if you genuinely enjoy your work and see clear paths for growth, you don't need to escape corporate life to start thriving financially.</p><p>Sometimes the smartest move isn't a dramatic leap into entrepreneurship; it's a strategic pivot within your current role, or a calculated side project that lets you experiment without risking financial stability.</p><h2>One Size Doesn't Fit All</h2><p>What works brilliantly for one person might be disastrous for another; and what's right for <em>you</em> today might not serve you well in the future.</p><p>A parent with young children might prioritize stability and predictable hours, focusing on passive income strategies or targeted skill development. A person with substantial savings and fewer responsibilities might be perfectly positioned to take a calculated risk on a startup venture.</p><p>This isn't about following someone else's blueprint; it's about designing a path that aligns with <em>your</em> circumstances and aspirations.</p><h2>Side Hustles: Finding Your Perfect Second Income Stream</h2><p>Side hustles have become more than just a trendy term &#8211; they're a practical strategy for diversifying your income while testing new skills and interests. What makes them particularly powerful is their flexibility; you can scale them up or down based on your available time and changing circumstances.</p><p>The most lucrative side hustles typically align with your existing expertise or develop valuable new skills that compound over time. Consider these categories: Service-based hustles, Product-based ventures: Sell physical or digital goods, Content creation: Build blogs, YouTube channels, or podcasts and Rental and optimization plays.</p><p>Digital products and software-as-a-service (SaaS) stand out for their scalability and potentially passive nature. SaaS works best when you've identified a specific, persistent problem in an industry you truly understand. Technical skills help, though no-code tools have democratized software creation to an extent. Remember that SaaS requires ongoing maintenance and traditionally takes 12-24 months to gain meaningful traction. However, recent advances in AI have significantly lowered the barrier to entry. From faster prototyping to automated support and content generation, AI tools are helping solo founders build, launch, and iterate SaaS products far more efficiently than ever before; sometimes reducing timelines from years to just a few months.</p><p><em>Consider <a href="https://x.com/levelsio?ref=levels.io">Pieter Levels'</a> story with <a href="https://nomads.com/">Nomad List</a>. It began as a simple spreadsheet ranking cities for remote workers; something he created to solve his own problem while traveling. That spreadsheet evolved into a SaaS platform with thousands of paying members who access cost-of-living data and connect with other nomads.</em></p><p><em>His approach is instructive: he started with the absolute minimum viable product, added features gradually based on user feedback, and built in public. Today, his portfolio generates over $1.5 million annually; all grown from side projects built by a single founder.</em></p><h2>Full-Time Entrepreneurship: The All-In Approach</h2><p>While side hustles offer lower risk, sometimes a business idea requires your complete focus and commitment. Some ventures simply can't be built on nights and weekends. If you're developing something with complex operations or that needs to scale quickly, you might need to go all-in. However, the best time to make this leap isn't at the idea stage; it's after you've proven that people will actually pay for what you're building.</p><p>Before taking the plunge, ensure you have a financial cushion of at least 12 months of living expenses. Your life circumstances matter tremendously here; those with fewer financial obligations or specialized fallback skills can better absorb the risk.</p><p><em>Entrepreneurship is often the most glorified path to wealth, and startup success stories are everywhere. We constantly hear about founders who turned an idea into a billion-dollar business; like Brian Chesky with Airbnb, Melanie Perkins with Canva, or Patrick and John Collison with Stripe. These stories inspire for good reason, but they also set a high bar and often gloss over the years of uncertainty, risk, and grind that happen behind the scenes. While this path can lead to incredible outcomes, it&#8217;s not the only way to achieve financial freedom; and it&#8217;s definitely not the easiest.</em></p><h2>The Hybrid Approach: Mix and Match Your Way to Wealth</h2><p>The most effective path to financial freedom isn&#8217;t always choosing one strategy; it&#8217;s often about combining elements from multiple approaches. Think of it as a personal portfolio of income-building moves: side hustles, skill development, passive income streams, and entrepreneurial ventures working together.</p><p>This hybrid approach lets you test entrepreneurial waters with minimal risk while still enjoying the stability of a regular paycheck. You can skill up within your day job while testing a side hustle, use your salary to fund a digital product, or turn a small project into a passive income stream that eventually becomes a business.</p><p><em><a href="https://nathanbarry.com/">Nathan Barry</a>, founder of <a href="https://kit.com/">Kit</a>(formerly ConvertKit), is a great example of this in action. He started building his email marketing SaaS while working as a designer, limiting himself to 20 hours a week. This constraint kept things sustainable and focused. As the business gained traction, he scaled his time investment. Today, Kit earns over $43+ million in annual recurring revenue; all rooted in a phased, hybrid approach.</em></p><p>The takeaway? You don&#8217;t have to choose one path. You can design your own blend based on your current capacity, risk tolerance, and goals&#8212;and evolve it over time.</p><h2>Know Your Situation, Then Choose Your Strategy</h2><p>Here's what matters most: there's no universal "best" path to financial success. By honestly assessing your situation, strengths, and goals, you can select the approach that makes the most sense for your current reality.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4lcz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e131c72-940f-423c-bff6-656a3abf9f7a_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4lcz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e131c72-940f-423c-bff6-656a3abf9f7a_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!4lcz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e131c72-940f-423c-bff6-656a3abf9f7a_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!4lcz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e131c72-940f-423c-bff6-656a3abf9f7a_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!4lcz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e131c72-940f-423c-bff6-656a3abf9f7a_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4lcz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e131c72-940f-423c-bff6-656a3abf9f7a_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5e131c72-940f-423c-bff6-656a3abf9f7a_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2396146,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://humblengineer.substack.com/i/160555195?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e131c72-940f-423c-bff6-656a3abf9f7a_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4lcz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e131c72-940f-423c-bff6-656a3abf9f7a_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!4lcz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e131c72-940f-423c-bff6-656a3abf9f7a_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!4lcz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e131c72-940f-423c-bff6-656a3abf9f7a_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!4lcz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e131c72-940f-423c-bff6-656a3abf9f7a_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>People are finding smart, creative ways to build passive income outside of traditional jobs. From renting out assets like backyard pools to turning digital products and handmade goods into online revenue streams, these side ventures prove you don&#8217;t need to quit your job to generate meaningful cash flow. Whether it's house hacking, e-commerce, or a niche product idea, the common thread is resourcefulness, consistency, and a willingness to experiment.</p><p>In upcoming posts, we'll explore how to maximize your chances of success with each strategy; whether you're climbing the corporate ladder, launching a product, or building automated revenue streams alongside your main job.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://thehumblengineer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Want to stay in the loop? Subscribe to The Humble Engineer&#8217;s Journal to get future posts delivered straight to your inbox. It&#8217;s free, and it helps support the work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Whatever path you choose, make sure it's a deliberate choice that reflects <em>your</em> priorities and circumstances; not just what worked for someone else.</p><h2>What's Working For You?</h2><p>I&#8217;d love to hear which wealth-building path you&#8217;re currently exploring or most curious about. Have a question about advancing in your career, building side income, or making the leap into entrepreneurship? Leave a comment below; your input might shape one of the next deep dives!</p>]]></content:encoded></item><item><title><![CDATA[Essential, Not Irreplaceable]]></title><description><![CDATA[How to Stay Valuable Without Becoming a Bottleneck]]></description><link>https://thehumblengineer.com/p/essential-not-irreplaceable</link><guid isPermaLink="false">https://thehumblengineer.com/p/essential-not-irreplaceable</guid><dc:creator><![CDATA[The Humbl Engineer]]></dc:creator><pubDate>Thu, 03 Apr 2025 06:28:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!SZWF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57650d28-2f7e-4acf-849a-2a1f5d2d225b_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>We've all encountered them in our careers; the indispensable colleague who holds the keys to critical systems, the manager whose absence brings projects to a standstill, or perhaps we've been that person ourselves. In professional environments, the question inevitably arises: <strong>Is being irreplaceable the ultimate career achievement, or a subtle trap? </strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SZWF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57650d28-2f7e-4acf-849a-2a1f5d2d225b_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SZWF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57650d28-2f7e-4acf-849a-2a1f5d2d225b_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!SZWF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57650d28-2f7e-4acf-849a-2a1f5d2d225b_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!SZWF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57650d28-2f7e-4acf-849a-2a1f5d2d225b_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!SZWF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57650d28-2f7e-4acf-849a-2a1f5d2d225b_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SZWF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57650d28-2f7e-4acf-849a-2a1f5d2d225b_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/57650d28-2f7e-4acf-849a-2a1f5d2d225b_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3149237,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:&quot;&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://humblengineer.substack.com/i/160476740?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57650d28-2f7e-4acf-849a-2a1f5d2d225b_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!SZWF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57650d28-2f7e-4acf-849a-2a1f5d2d225b_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!SZWF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57650d28-2f7e-4acf-849a-2a1f5d2d225b_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!SZWF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57650d28-2f7e-4acf-849a-2a1f5d2d225b_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!SZWF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F57650d28-2f7e-4acf-849a-2a1f5d2d225b_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The Seductive Appeal of Irreplaceability</h2><p>At first glance, becoming irreplaceable seems like professional success personified. Your job feels secure even during downsizing. You enjoy elevated status as the go-to expert, with a voice that carries weight in decisions. When you're the guardian of critical knowledge, you naturally gain bargaining power for better compensation and opportunities.</p><p>The psychological rewards are just as compelling; there's genuine satisfaction in being needed. Those deemed essential often receive access to higher-stakes projects before their peers. No wonder many professionals instinctively build moats around their expertise, sometimes unconsciously hoarding knowledge or creating unnecessarily complex systems only they can navigate. It can be addictive.</p><h2>The Hidden Costs of Being the Only One</h2><p>Despite these apparent advantages, making yourself irreplaceable extracts steep personal and professional costs. When systems depend entirely on you, true disconnection becomes impossible. Vacations transform into remote work sessions, and personal emergencies create dual crises. </p><p><em>There have been real cases of individuals forced to handle work crises during major life events; even their own weddings. In the middle of a once-in-a-lifetime moment, they were pulled away to troubleshoot because no one else could. When work interrupts even a moment as sacred as exchanging vows, it raises the question: is irreplaceability a true achievement or a hidden burden?</em></p><p>Constantly responding to tactical needs ("only you can fix this!") prevents engagement with higher-level thinking and innovation that drives real career growth. Paradoxically, becoming indispensable in one area can restrict mobility, as organizations hesitate to move their "database expert" or "client whisperer" into new challenges.</p><p>From an organizational perspective, projects or teams built around irreplaceable individuals represent single points of failure - precisely what robust systems are designed to eliminate. Perhaps most significantly, true leadership isn't demonstrated by creating dependency but by building capability in others - a reality that becomes apparent at higher organizational levels.</p><p>While the idea of creating scalable systems and delegating responsibility is widely discussed among leaders and managers, it&#8217;s often overlooked when it comes to individual contributors (ICs). Too frequently, ICs are encouraged to focus on becoming irreplaceable within their teams or projects, when the true value lies in making work more independent of their direct involvement. The shift from being indispensable to strategically essential is just as crucial for ICs, fostering not only personal growth but also the growth of their teams and organizations.</p><h2>The Strategic Alternative: Value Without Dependency</h2><p>The most successful professionals understand an important distinction: being essential is about the value you create; being irreplaceable is about dependency you foster. The transition requires a three-pronged approach.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thehumblengineer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thehumblengineer.com/subscribe?"><span>Subscribe now</span></a></p><h3>Build Systems, Not Dependencies</h3><p>Create clear, accessible documentation that transforms your implicit knowledge into organizational assets. Record processes and technical details with enough clarity that others can follow them independently. Identify repetitive elements in your workflow that could be automated, improving consistency while reducing dependence on your intervention. Whether creating code, processes, or team structures, prioritize simplicity and intuitive design that others can understand and maintain.</p><h3>Multiply Your Impact Through Others</h3><p>Move beyond reactive explanations to proactive knowledge transfer. Schedule regular sessions to teach others your approaches and thought processes. Establish team practices like rotation of responsibilities and pair work sessions that distribute expertise organically. When team members successfully handle tasks that were previously "your domain," celebrate these moments publicly, reinforcing that knowledge transfer is valued.</p><h3>Redefine Your Value Proposition</h3><p>Position yourself as someone who elevates team capability rather than performs individual heroics. Use the time and mental space freed from constant firefighting to identify new opportunities that demonstrate strategic value. Cultivate abilities that transcend specific domains&#8212;leadership, communication, problem-solving frameworks&#8212;that remain relevant as you move between roles.</p><h2>Finding the Sweet Spot: Consciously Essential</h2><p>The ideal position isn't being completely replaceable; that risks making you truly dispensable. The sweet spot is being "consciously essential" in ways that benefit both you and your organization.</p><p>Develop a distinct value proposition through unique insights and specialized skills that would be temporarily missed in your absence. Aim to be hardest to replace not for tactical knowledge but for your judgment, vision, and ability to navigate complexity. Ensure day-to-day operations continue smoothly without you, while your strategic input remains highly valued for major initiatives.</p><p>Focus on creating new opportunities and solving emerging problems rather than being defined by existing processes. In this balanced approach, you become known as someone who elevates capabilities across the organization while remaining free to evolve your own role and focus.</p><h2>The Paradoxical Rewards of Letting Go</h2><p>By making your work less dependent on your personal intervention, you unlock significant benefits. The ability to genuinely disconnect enables true recovery, preventing burnout and maintaining creativity over the long term. As you demonstrate the ability to build systems larger than yourself, you become attractive for roles with broader scope.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uBhi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d57c03f-a125-48a1-8e2a-f00c826f20f4_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uBhi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d57c03f-a125-48a1-8e2a-f00c826f20f4_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!uBhi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d57c03f-a125-48a1-8e2a-f00c826f20f4_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!uBhi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d57c03f-a125-48a1-8e2a-f00c826f20f4_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!uBhi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d57c03f-a125-48a1-8e2a-f00c826f20f4_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uBhi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d57c03f-a125-48a1-8e2a-f00c826f20f4_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9d57c03f-a125-48a1-8e2a-f00c826f20f4_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1415667,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://humblengineer.substack.com/i/160476740?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d57c03f-a125-48a1-8e2a-f00c826f20f4_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uBhi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d57c03f-a125-48a1-8e2a-f00c826f20f4_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!uBhi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d57c03f-a125-48a1-8e2a-f00c826f20f4_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!uBhi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d57c03f-a125-48a1-8e2a-f00c826f20f4_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!uBhi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d57c03f-a125-48a1-8e2a-f00c826f20f4_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Your approach creates resilient teams with distributed capability, multiplying your impact far beyond what individual heroics could achieve. Transitions - whether promotions, role changes, or departures - happen with dignity and minimal disruption, enhancing your professional reputation.</p><p>Take a moment to assess your own role; <em>are you enabling long-term success, or creating dependency?</em> Start by identifying one key process you can document, automate, or delegate this week. Small steps toward independence will not only strengthen your team but also give you the freedom to focus on bigger, more meaningful challenges.</p><h2>Beyond Irreplaceability: The New Professional Ideal</h2><p>The most valuable professionals today aren't those who create dependency but those who create lasting capability. They build systems and teams that function without them, precisely because they've invested in transferring their knowledge and approach.</p><p>True professional maturity means understanding that your highest contribution isn't being the irreplaceable hero, but rather building something that transcends your individual involvement: systems that scale, teams that grow, and capabilities that endure.</p><p>By shifting from merely "irreplaceable" to "consciously essential," you create more sustainable success for yourself while contributing to more resilient organizations. In the process, you unlock opportunities for growth that dependency can never provide.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://thehumblengineer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Humble Engineer's Journal! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Why Perseverance Outshines Motivation]]></title><description><![CDATA[The True Key to Achieving Goals]]></description><link>https://thehumblengineer.com/p/why-perseverance-outshines-motivation</link><guid isPermaLink="false">https://thehumblengineer.com/p/why-perseverance-outshines-motivation</guid><dc:creator><![CDATA[The Humbl Engineer]]></dc:creator><pubDate>Wed, 25 Dec 2024 06:25:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!13Xq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed41c53f-9335-4fd3-a29b-992cd136fafc_650x310.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Have you ever set a goal to get into shape, finish a cybersecurity certification, or develop a new skill&#8212;only to lose steam midway? If this sounds familiar, you&#8217;re not alone.</p><p>Many attribute their setbacks to a lack of motivation, thinking, &#8220;I need more motivation&#8221; or &#8220;I lost my motivation.&#8221; But is it really motivation that&#8217;s holding you back? In my view, motivation is often overrated, and the idea that you must &#8220;stay motivated&#8221; can be a misleading simplification.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!13Xq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed41c53f-9335-4fd3-a29b-992cd136fafc_650x310.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!13Xq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed41c53f-9335-4fd3-a29b-992cd136fafc_650x310.jpeg 424w, https://substackcdn.com/image/fetch/$s_!13Xq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed41c53f-9335-4fd3-a29b-992cd136fafc_650x310.jpeg 848w, https://substackcdn.com/image/fetch/$s_!13Xq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed41c53f-9335-4fd3-a29b-992cd136fafc_650x310.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!13Xq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed41c53f-9335-4fd3-a29b-992cd136fafc_650x310.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!13Xq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed41c53f-9335-4fd3-a29b-992cd136fafc_650x310.jpeg" width="680" height="324.3076923076923" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ed41c53f-9335-4fd3-a29b-992cd136fafc_650x310.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:310,&quot;width&quot;:650,&quot;resizeWidth&quot;:680,&quot;bytes&quot;:59557,&quot;alt&quot;:&quot;The Pursuit of Happyness (2006) - The Bathroom Scene&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The Pursuit of Happyness (2006) - The Bathroom Scene" title="The Pursuit of Happyness (2006) - The Bathroom Scene" srcset="https://substackcdn.com/image/fetch/$s_!13Xq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed41c53f-9335-4fd3-a29b-992cd136fafc_650x310.jpeg 424w, https://substackcdn.com/image/fetch/$s_!13Xq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed41c53f-9335-4fd3-a29b-992cd136fafc_650x310.jpeg 848w, https://substackcdn.com/image/fetch/$s_!13Xq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed41c53f-9335-4fd3-a29b-992cd136fafc_650x310.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!13Xq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed41c53f-9335-4fd3-a29b-992cd136fafc_650x310.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: The Pursuit of Happyness (2006) - The Bathroom Scene</figcaption></figure></div><p>Motivation is the spark&#8212;the emotional drive that gets you started. It&#8217;s that rush of energy you feel after watching an inspiring video or hearing an uplifting speech. While it can propel you into action, it&#8217;s not what sustains you when challenges arise. The real key to success lies in perseverance and discipline&#8212;the unsung heroes of achievement. Let&#8217;s explore why motivation isn&#8217;t enough and how shifting your focus to perseverance and discipline can help you achieve your cybersecurity goals.</p><h3>Why Motivation Is Not Enough</h3><p>Motivation is often fleeting and depends on external factors like inspiration, mood, or circumstances. You may feel highly motivated to pursue a cybersecurity certification after hearing about its career benefits, but what happens when the material gets challenging or the certification exams become overwhelming? The problem with motivation is its inconsistency&#8212;it can fluctuate based on external factors, leaving you struggling to maintain momentum.</p><p>Discipline, however, is what ensures you stay on track, even when motivation wanes. Let&#8217;s use the example of climbing a mountain: motivation may get you to put on your boots and take the first step, but discipline keeps you moving forward when the path gets tough. Without it, the initial burst of motivation will quickly fade, leaving you stuck in the middle.</p><p>Take the example of the CISSP or OSCP certifications. These require hundreds of hours of study and hands-on practice. Motivation might get you started, but it&#8217;s the discipline that helps you create and stick to a study schedule and perseverance that keeps you going when the going gets tough.</p><h3>The Power of Baselines vs. Targets</h3><p>When setting goals, it&#8217;s common to focus on targets&#8212;like &#8220;I&#8217;ll read 10 pages a day&#8221; or &#8220;I&#8217;ll study for 2 hours every day.&#8221; But I recommend setting baselines instead of fixed targets. Here&#8217;s why:</p><p>Think of a baseline as the minimum amount of work you commit to. For example, you might set a baseline of reading 4 pages per week. While you should aim to exceed this baseline, it creates room for flexibility and growth. If you treat it as a target, you may stop once you&#8217;ve met it, missing out on opportunities to push yourself further. With baselines, you&#8217;re free to exceed your minimum commitment without the pressure of a rigid target.</p><p>Setting a smaller baseline gives room for flexibility and consistency. For example, you might ideally aim to study for 2 hours a day most days. However, life happens&#8212;family commitments or unexpected events might limit your available time, and some days, you may only be able to spend 30 minutes. By setting your baseline to this minimum, achievable goal of 30 minutes, you ensure that you always have a realistic target to hit. On days when you have more time, you can exceed this baseline and study for 2 hours or more. This approach reduces the pressure of needing to meet an ambitious target every day, making it easier to stay on track while still allowing for flexibility when life gets in the way.</p><h3>Focus on progress over perfection</h3><p>Focus on net-positive results over perfection means prioritizing progress and tangible results rather than striving for flawless outcomes. Perfection can often lead to paralysis, where the fear of making mistakes or falling short prevents any action at all. By focusing on net-positive, you embrace continuous improvement, recognizing that small, positive steps&#8212;whether big or small&#8212;add up over time. It&#8217;s about making consistent, meaningful strides toward your goals, learning from setbacks, and moving forward instead of getting stuck in the pursuit of an unattainable ideal.</p><h3>Shifting Focus: How to Prioritize Perseverance and Discipline</h3><p>So, how can you shift your mindset and focus on perseverance and discipline over motivation? Here are a few practical strategies:</p><ul><li><p><strong>Redefine Success:</strong> Stop thinking of success as a product of fleeting moments of inspiration. Instead, see it as the result of consistent, disciplined effort over time. Celebrate small wins along the way&#8212;completing a chapter, learning a new concept, or progressing in a skill&#8212;rather than just focusing on the end goal.</p></li><li><p><strong>Create Sustainable Routines:</strong> Build a schedule that doesn&#8217;t rely on motivation. Make personal or professional development, like reading, practicing cybersecurity skills, or exercising, part of your weekly routine.</p></li><li><p><strong>Embrace Challenges:</strong> Discipline and perseverance thrive in adversity. See tough assignments, like responding to a major security incident or implementing a complex security architecture, as opportunities for growth rather than obstacles. Setbacks are inevitable; embrace them, and do not get discouraged by them. As long as you are making progress, no matter how small or slow, it doesn&#8217;t matter&#8212;what matters is that you&#8217;re moving in the right direction. Keep moving forward, keep progressing, and trust that each step, no matter how incremental, brings you closer to your goal. It's the momentum that counts, not the speed, and every bit of progress adds up over time. </p></li><li><p><strong>Be Compassionate with Yourself:</strong> Perseverance is about continuing despite setbacks. When you fail&#8212;whether by missing a deadline or struggling with a concept&#8212;treat it as part of the learning journey and keep moving forward.</p></li></ul><h3>Conclusion: Perseverance Over Motivation</h3><p>To truly achieve your goals, it&#8217;s essential to shift away from romanticizing motivation. While it has its place, relying on it as your main driver can be limiting. Instead, let&#8217;s celebrate stories of perseverance and discipline. Think of figures like Thomas Edison, who famously failed thousands of times before inventing the lightbulb&#8212;his success wasn&#8217;t due to fleeting motivation but his persistence in the face of failure.</p><p>Persistence and discipline often make the difference between success and failure. So the next time you feel unmotivated, remember: you don&#8217;t need to feel like doing something to do it. Lace-up your boots, take the next step, and let perseverance carry you toward your goals.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://thehumblengineer.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Humble Engineer's Journal! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://thehumblengineer.com/p/why-perseverance-outshines-motivation?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://thehumblengineer.com/p/why-perseverance-outshines-motivation?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item></channel></rss>