Sunday, March 8, 2026

The existential impotance of “well, it works for me” reply guys

There are a lot of useless comments on Internet support communities. They have been around since Usenet first allowed semi-anonymous threads to ooze over audio couplers at 300 bits per second. I’m sure you know some of the hall-of-fame bangers.
“RTFM”
“You’re using it wrong.”
“Why would you want to do that?”

Apart from being cursed with the inability to see anything from any angle but their own, the Useless Commentor™is also, generally speaking, extremely volatile toward any reasoning that challenges their monolithic view of any topic. While it is genderless, classless, and raceless - able to survive in any habitat - our dear UC does trend toward the white, the male, and the conservative. As is, likely as anything, a shock to no one.

Lying in wait, ready to pounce upon anyone trying to learn or, worse still, trying to get help with a legitimate problem, the UC will attempt a dominance display at the first opportunity. Usually arriving shortly after the ‘First!’ers, perhaps the only group of posters who can lay even less claim to enriching discourse. They are a generally harmless species, mind. Just pissing on every tree stump they can like a dog with a tiny body and a titanic ego. They are all bark, and the bark itself is just a nuisance more than it is a confrontation. The UC, as is often the case with the second carrion scavenger at the carcass, is bigger and uglier.

Rushing in to dismiss another person’s experience is a passtime for a certain personality type. On the extreme end, you have the people making policies strictly to bolster their narrow views, with harm as an intended side effect. An extra kick in the ribs as the people they’ve ‘othered’ fall in the mud. Adding insult to injury is not a bug. It’s a feature. The UC gets a similar hit of neurotransmitters when griefing prey. Make no mistake, that’s what it is. These mallets lie in wait, jumping on new posts like Richard Branson jumps on any woman younger than 27. Awkwardly, uncomfortably, and ‘only as a joke’ if called out.

A photo of a CRT tv screen showing Salma Hayak being grabbed by Richard Branson on the set of Conan. Conan looks on with disgust.
Dick by name, dick by nature.

The UC delights in scuttling the ship of curiosity in novice hobbyists. Kicking the chair out from under already frustrated people hoping to find an answer to a blocking problem. Setting fire to the joy of anyone who, in an age of access to information so unfathomably vast compared to only 45 years ago one from that age would think you an utter lunatic in its description, simply wants an answer to a simple problem and hopefully throws their bottled message into an unforgiving sea.

Of all their hunting methods, none of which provides any hint of usefulness to discourse, the one I despise the most is ‘It works for me.’

‘It works for me’ is infuriating on a level that exceeds the other sufferings put forth by UCs simply by the wastefulness of it. Reading the fucking manual, apart from not being immediately helpful, is - at some level anyway - advice. Alternate use cases are often the workaround a person was looking for, but presented as a rotten herring drawn across the face as an insult. The lack of empathy required to blind oneself to other possibilities is somewhat tragic; not deserving of pity, but also the kind of self-immolation of respect that anyone with a modicum of introspection immediately clocks as a personal lacking in someone crowing on about it.

No, ‘it works for me’ is a special brand of disrespect and smugness that the UC wears proudly. Like TapOut! graphic tees or Berkleys on the back of the head. It’s a dogwhistle to their ilk and is often met with similar howls in response from other UCs who share in missing whatever key piece of nurturing keeps a person from turning into an asshole whenever the moon is the moon.

Jason Bateman as the titular Teen Wolf Too in the film of... you know what titular means. He's wearing a blue suit jacket, blue pin-striped shirt, and red tie.
You should check out my podcast, Team Jacob NoHomo!

‘It works for me’ serves no purpose other than to tell an uncaring universe that you are alive and you are better than some random person on the internet. It is, at best, a brag and at worst a shut down. It adds literally nothing to discourse, acting only to hinder or derail it. It’s the call of the incompetent developer. The cry of someone with no idea of how to help, but with an ego that refuses to not be seen. It’s an attempt to be part of a conversation from across a crowded room that bulldozes the entire buffet table.

Sure, the phrase itself can be uttered and followed by suggestions or help, but at that point it becomes useful and stops being the thing it was. When uttered in isolation it’s nothing more than a prayer to an indifferent cosmos - a 5 year old throwing a toy at someone because they aren’t paying them the attention they think they deserve - and a pheromone trail for other emotional leeches to follow.

In fairness, it’s not always about individual superiority. It’s often used as an aegis to a brand identity grown as a replacement for a personality the UC never cared to cultivate. Xbox can do no wrong. Apple is infallible. Anyone having a problem is obviously a shill or a troll or a naysayer out to do harm to an omnipotent, yet unimaginably fragile god. Any question is an attack. Any problem is an affront. Because if the things they buy and watch and believe in aren’t perfect, what does that say about them?

That’s when the tribalism kicks in. The pack mentality of the kind of person who brands themselves a ‘lone wolf’ is shockingly cohesive. Point out that the reply helps nothing and prepare to be stoned at the city gates. The gnashing of teeth and ripping of flesh will continue until obedience is restored. Threads will get locked and answers will go on being ‘un’d and nobody is the better for any of it. The people who could help will never see the post because it was shut down before it could get their attention. The other people who might have a legitimate answer will be unable to respond or the person who originally asked will never return to see the words that could have helped them get out of their pickle. For no other reason than a small person in a vast eternity had nothing more to offer than, ‘well, it works for me.’

Friday, March 6, 2026

If you don’t host it, you can’t trust it

One of the broadly-accepted privacy stalwarts has just turned rat.

https://tech.yahoo.c … -aids-160711711.html

There’s a lot to say about this news. The fact that the service sells privacy as the product even more than the service itself, to the fact that free accounts are inherently more secure than paid accounts owing to this utterly unforgivable loophole in their protections for customers. The fact that aiding an active regime of war criminals is being brushed off as ‘following orders.’ The fact that they are using the buffer stage of rolling over for their own government as the excuse from ridicule. The fact that you are constantly bombarded with upgrade/upsell ads when using the service which all - again - focus on buying privacy and security. The fact that they have a glib, canned response and astroturf trolls on social media trying to steer the conversation into personal accountability. All of it is obscene.

Proton has taken an immediate, reactionary, hostile approach to this being leaked to the news. They call it click bait (it’s not). They call it misrepresentation (it’s not). They have their brand-identifying user base marching for them in social media comments, decrying the person for not obfuscating their own payment methods rather than blaming the person who lied to their user base (they did). They call it anything but a problem for them to solve, violently hand waving to the point of slap fighting.

Slappy Squirrel, an anthropomorphized grey squirrel from the TV show Animaniacs with her grandson. She's wearing a green bowler with a yellow flower and carries a pink purse.
Pump the breaks there, Squirrely Ma’am.

And as problems go, Proton, despite being A problem, is not THE problem on display here. They suck. Do not think I’m in any way asking for absolution for their utter shittery. Rather, there is an inherent problem with any service you do not personally host. When faced with compromising their advertised ideals, they are only as strong as their board members will allow them to be. Promises are free. Actions are not. Until an event occurs which burns away the facade they’ve built in times of easy sailing, there is never a guarantee that any entity you don’t control won’t immediately cave to any outside pressure deemed too difficult or expensive to challenge. In this case, rather than even test the laws of their home country, the company scuttled the ship at the first sign of a boarding party. Being a Not For Profit just means the decision was made by people who didn’t want to deal with the hassle of defending their product’s core feature, rather than being a fully financial decision in the endless pursuit of more profit. Same outcome.

There’s no solution for this, from the standpoint of the average consumer. Hosting your own e-mail service is no longer tenable for nearly anyone and doing it in an anonymous way is basically impossible. Constantly using throw away accounts means not having a permanent address and basically makes e-mail about as useless as a rain-soaked ValPak stuck to the top of the communal dumpster lid.

There are a few mitigations, but no matter what you do, ultimately anything hosted outside of your control is outside of your control. VPNs? Doesn’t matter what the law is where you end up. With enough pressure, it can all be linked back to you if any piece of identifiable information is involved. Your payment method? Easy. Your originating IP? A little harder, but not by much. Even if you hop and hop and hop, the trail exists. Your only true option for anonymity is burner hardware that you dispose of after use. And that’s economically and ecologically a horrible option. All you can do is make the trail back to you as hard as possible to follow. I know it sounds as if I’m echoing the people who blame the victim for not obscuring payment info, but their action - in this case - is correct. The blame still lives with the company that lied, but in praxis, that’s little consolation. It is, however, a good way to find people to block on social media.

There are a few things you can do to make the pursuit of your information a high enough cost of entry to prevent a free bingo square for the pigs and pigeons who might want to find you. First and foremost, don’t believe a goddamned thing any company says about privacy in regards to selling it to you.

A closing scene from an episode of The X-Files showing an overcast dusk with a mountain in the background. White text on the screen reads Trust No One
It’s not aliens, Mulder. It’s always just greedy old white guys.

Second, don’t pay for any service you want to be anonymized through an account linked easily back to you. Prepaid cards are an option (bought with cash, preferably). Crypto is about as anonymous as a Zorro mask worn while showing off a chest tattoo of your driver’s license and the world built around it is very similar to these privacy-first services. They do not actually protect you from anything. The manifests for transactions can, with a bit of forensics, bet rebuilt pointing right back to you unless you did the initial buy in a completely anonymous way. If you’ve already got your foot in that quicksand, do what you will. But for people who don’t want to touch it, stick with converting cash to anonymous payment methods in the real world.

Third, use free accounts with false information to run any protest organizations. Don’t use subscription based services that force you to keep a payment record on file. Freedom of speech, and in fact, the entirety of the Bill of Rights has been shown time and time again to not be anything but a promise to gullible customers. Especially when critiquing capitalist dogma or elite class supremacy. You can go online and talk a child into killing themselves or walk into another state and open fire on brown people all you want and it’ll be considered your undeniable right. But say that you think rage-fucking the entire planet into apocalyptic extinction is maybe not so good and your information will be handed over without a second thought. The Mrs. Kravitses of the world are overwhelmingly fascist-leaning and will drop more dimes than a busking hedgehog running into a spike trap.

Sonic the Hedgehog pointing a single finger in the air. Text has been photoshopped to read Sonic the Stoolpigeon. Flavor text reads I'd sell out your mother for a single ring - blurry shrub rat.

There are options like co-op service subscriptions where ownership is decentralized among a few people who trust each other or running through the absolute dredges of humanity along side illegal pornographers, human traffickers, and raw milk peddlers. There’s a high bar to entry in understanding things like the Onion network and an even higher bar of technicality in implementing those understandings. You’re still stuck with the first-payment problem, in most cases. Getting comfortable with using cash is still the key element to protecting yourself from payment provider abuse. Laundering your completely legal activity should not be something we are required to do and my hope is that a lawsuit arises from this that costs Proton much more than they would have spent defending the principals they sold. The world does not deal in fairness, though, and the business self-preservation instinct is myopic, amnesic, and very, very stupid, so lessons will likely be ignored even if that does happen. All we can do now is tell people who blame victims to shut their fucking mouths but take their methods and internalize them.

Saturday, February 28, 2026

Pete Hegseth has tiny dick energy

That’s it. That’s the whole blog entry.

Sunday, February 22, 2026

Pro Tech? Pro Protest? Protect Your Tech and Your Neck with Protest Pro-Tips

The myth of the anonymous Internet - and it has always been a myth - is slowly fading as the average Internet user watches their protections and rights to be ignored wholly forgotten in the mad rush for capital-building information. While forensics have been able to piece together identifying markers from online activity for decades, the cost of doing that work has gone down substantially in recent totalitarian regimes. In the United States, the fourth amendment has generally held that your privacy, digital or otherwise, cannot be invaded without judicial intervention. Just cause has turned into “just ’cause” overnight with the very public dismantling of checks and balances. Private tech companies no longer worry about rolling over for fascism causing their stock to drop. Humans are no longer their customers. Speculative bubbles are more profitable and if they never have to put the money back into the pot - rather, just hand it back and forth to one another and tip their hats like playground pantomime - they are all the more happy. So why bother saving face when you can get special treatment by playing ball with dictators? That hurdle has classically been the most difficult one to overcome when doing Internet sleuthing and it has eroded entirely.

Palantir and its precursors, along with government programs like PRISM, work their way into boards and halls of tech giants. They use kickbacks, permitting, and all sorts of bribery to make sure that the biggest-named players are all in on the grift of faux security in modern tech. But tech is less secure than it has ever been. It may prevent low-rent script kiddies from scamming your Roblox account, but everything you do on most of your devices can be laid bare in seconds if someone merely decides to look.

A screenshot from the film The Dark Knight showing Lucius Fox standing in front of illegal surveillance monitors.
I wish I could tell you Andy fought the good fight. But he just memed and masturbated. Constantly.

Again, this is not new. Logging has been fundamental to computer network interaction since its inception. Things needed for reliable communication over an infrastructure made to carry flustered Trans-Atlantic accents from Pennsylvania-65000 to Klondike-5555 were already being stored so these digital bridges could be created. Endpoints had to be known. Routes had to be known. Owing to this, there was little anonymity in computing from the start. Anonymity was added, intentionally and otherwise. Log files take up space, so anonymity is bolstered simply by not storing this information past the active session. But compression got extremely good, extremely fast. Especially for text. Logs became less and less a storage concern and more one of privacy well before AOL shipped its first disk. For a while, privacy was a top tier feature in online communication. At least, behind the scenes. People love to identify themselves. It’s almost like we are all apes made of existential dread and routine. Because we are. As the net became more ubiquitous, people started realizing the importance of privacy. Not for illicit acts, though certainly those were in the mix. But for every day activities that were becoming more common online. Communication with friends, family, doctors, colleagues. These all needed some protection from prying eyes. Encryption technologies became an arms race against bad actors trying to hijack communications to steal what information they could. At the same time, however, companies began realizing how much of the data flow they controlled and how much that data could be used to create targeting for themselves. Then, they realized people would still pay for services even if ads where part of that service. In some old newsroom storage closet, William Randolph Hearst’s portrait smiled. So began the two-faced deceit of IT security.

Ernestine, a character portrayed by Lily Tomlin. A phone operator in 40s-50s American clothing sitting at a switchboard with a headset on. Her tongue is sticking out.
We don’t care. We don’t HAVE to. We’re the phone company.

All of this is just a long-winded intro to say this: No corporate entity ever has your best interests in mind when making decisions. Only profit. Or reduction of loss. When paramilitary police forces decide to dox you, the ’safe, secure, encrypted’ services you use from publicly traded for-profits mean absolutely nothing. They have your data. They will give it over to the cops. It’s the most financially beneficial stance (on paper), and that’s the only stance they will ever take.

So what is there to do? Break out paper cups and semaphore flags? How can you go to a protest and keep your digital life from becoming Exhibits A-Q should a stormtrooper decide you look enough like his ex or his abusive dad or just that kid he beat up in high school so it’s your day to get zip-tied and paddy-waggoned? Not all is bleak, nor do you have to pull a Full Amish when you head down to the future kettle where the first amendment is “protected” until it’s not. You can do quite a bit to harden your personal security - which in turn makes those around you more secure. It’s work, but what isn’t these days? Work, I guess.

Leave your phone at home

This is one of those pieces of advice that often gets eye-rolled by activists and organizers. But before you dismiss it, hear me out. I’m not saying ‘don’t take a phone.’ I’m saying leave the phone you use as your primary device at home. It is very easy and very cheap to pick up a second phone for recording - one of the most important functions of a phone at any protest - and communication. You can use an anonymous pre-paid carrier phone for emergencies, an old phone you’ve wiped, or grab a cheap used unlocked phone off of any number of marketplaces. Considering the despicable desposability cycle of modern phones, you can probably find a few free ones with some calls to friends and family. A few things to keep in mind:

  • Fully factory reset any phone you receive or purchase. If possible, do this offline using tools from the manufacturer.
  • If an alternative, hardened OS such as GrapheneOS is available for your device, consider using that instead of stock Android or the manufacturer’s bloatware.
  • Try to find a phone that uses a physical SIM card. eSIMs are convenient, but are tied to the device and usually tied to the sales records of the device. A physical SIM lets you swap to another carrier or a prepaid number with ease.
  • Keep apps to the bare minimum. When possible, use app stores that do not tie to an account. F-Droid is a good option. Obtainium is very popular as well.
  • DISABLE BIOMETRICS. Apart from being way less secure than they purport, biometrics can be used to illegally compel you to unlock your device. Face scans are NOT legally protected. Fingerprint scans can be obtained through force. Set up a complex PIN or password and don’t fall for the false security of biometric login.
  • Don’t sync accounts, contact lists, texts, etc. Don’t use e-mail applications. Check e-mail through a private browser session. This is a pain because you have to manually enter security info every single time, but it means that there’s no forensic footprint left on your phone once the session is closed.
  • If you need to stream or capture to a cloud service, add a second, anonymized account for doing so. You can always re-share from your primary account later, but there’s no reason to link your activities to verifiable identification.
  • Remove data from your phone when you get home. Back it up on a secure drive and remove it from the device. Again, there’s no reason to provide a free map of your whereabouts for potential prosecutors.
  • Use a VPN (with manual credentials, not apps). A VPN can help protect you from local scanners, a more and more popular tool for oppressors, as well as provide an extra layer of cover from your carrier snooping on their behalf. Generally, use a VPN from a country with sound data protection laws like the Netherlands if possible.
  • Utilize wifi hotspots over cellular data when possible. Many areas have free wifi if you look for it. Combined with a VPN, getting your exact activity trail becomes much, much harder.
  • Only give the phone number for the device (if applicable) to a few people you trust. An army willing to use a 5 year old to draw people out of a house will absolutely put pressure on people close to you. People can’t give up your info if they don’t know it, so keep the list as small as you can.
  • Use your protest phone for protesting. Keep it on Airplane Mode or turned off. Take it off Airplane Mode AFTER arriving at the protest. Put it in Airplane Mode BEFORE you leave the protest. Cell tower pings can be used to create a very accurate map of your path to and from. Again, don’t give them anything for free.
  • If you simply cannot use a dedicated phone and cannot leave your phone at home, consider paring down apps, creating a second profile with very little information and using that when you’re at gatherings, using a VPN, disabling ALL AI tools, turning off tracking metrics (such as “send us data to improve your experience while using the app!” settings), signing out of social media accounts, and following the biometric and VPN suggestions above.

Be comfortable being bored

Excepting a secured phone (if necessary), don’t bring any connected devices with you. No iPad. No Switch. No Steam Deck. No ROG Steam Deck But Worse. If you have one of those handheld retro devices from Anbernic or anything with bluetooth, wifi, or mobile data, just leave it at home. Tablets, smart watches, even many MP3 players - anything that can connect with a wireless service of some type can be scanned and identified and linked to you if found on your person after an arrest. If you’re going to a protest, you’re going to protest. Not to scroll feeds or find epic mounts. Being uncomfortable with being bored is no reason to tag yourself like a migratory whale pod.

Don’t give up your entire identity at home

In your day-to-day life, more and more of your online identity is being added to your digital fingerprint. Platforms can predict, with astounding accuracy, what your next website visit will be. They can pick you out of a haystack of haystacks of users in seconds. Every cookie you accept, every permission you grant…they’ll be watching you.

A black and white photo of the band The Police. Sting is in the center wearing an old-timey beach strongman shirt under a suit jacket. I honestly don't know anything about the rest of the band.
ACAB even means these guys.

Use a VPN on your home network. You don’t need to go so far as to tunnel to another country for your day to day use, but just adding one more layer of obfuscation helps. Obscurity is not security, but it’s better than nothing. Use secure communication when available. Set your browser to always use https, in example. Switch off of known problematic messaging apps like Discord to more secure options like Signal. Don’t use AI processing on anything. In fact, turn off AI everywhere you can. If you’re using Windows, [url-”https://www.howtogeek.com/how-to-rip-out-copilot-from-windows-11/” target=”new”]uninstall and prevent CoPilot from reinstalling [/url](note - this can change on a whim and they are pushing CoPilot hard, so your best bet is to leave Windows or go back to Windows 10 and use a debloating tool). Switch your search engine to a non-AI backed search such as DuckDuck Go’s No AI service. Remove AI tools from your browser if you use Chrome or Chromium based browsers or Firefox. (Note, beginning with Firefox 148, a single kill switch will be introduced under Settings -> AI Controls -> Block AI Enhancements, but it has not rolled out globally at the time of this writing).

Don’t use social media to discuss your activities at protests. You can obviously be loud and proud about your views, but any insight into the inner workings of direct action will be use to subvert it. There is no virtue signalling in protest. There’s no reason to share intel with the enemy during an active war. Save your mementos in a safe, encrypted location. Once everyone swears they were always against all of this, which they will, feel free to make a wall of dissent. But during active operations, no need to identify locations, organization, or the faces of others for internet points.

Keep your systems secure. Self-hosting can be a great way to withdraw from the onslaught of platform rot, but it can also open you up to attacks. Automated attacks are becoming more sophisticated, or in the case of AI based attacks, more frequent to the point of overwhelming systems. Not smarter, just more waves crashing against the beach. Protect yourself by understanding edge security. Make sure your router is not compromised and is up to date on its firmware. Make sure to keep an eye on security bulletins for software you host and quickly update it if a confirmed security hole is disclosed. This is obviously for more technical folks, but anyone can learn how to lock down their home network in a couple of days worth of YouTube videos and old forum posts.

Stop using Spyware as a Service

The Superbowl ad for Ring really shook the tree in terms of the general public’s understanding of just how perverse and pervasive private spying has become. Convenience has, for at least the last two decades, come at the cost of security. We hand over our details willingly to save a few steps while logging in or to scream into our personal void and have it play back our favorite comfort songs. Ditching digital servants is a minor inconvenience that feels like oppression to so many who are now used to the ease of it all. I promise, it’s really not that hard to pick a playlist by hand. Drop digital assistants from your phone. Doubly so if they’re AI-backed. Get rid of Echos and Smart Speakers and cloud-connected doorbell cameras and app-based light managers and all that BS. You can find replacements that leave all of your data in your personal network for nearly everything. So if you really need the convenience or are in a position where you need these things for accessibility, there are options. Home Assistant is a robust, multi-protocol service which can be locked down, but still control your existing closed-source hardware, in example.

Don’t use sign-in aggregators when you can avoid it. “Sign in with Google” sure feels like a convenient wonder. But what it really is is a single point of access for anyone who is able to get your Google device from you. Like the cops or TSA (cops) or ICE (somehow even more cop cops). Instead, consider an encrypted password manager with a strong master password (not biometric!) and individual site password. Avoid saving the password manager backups on cloud storage and instead, sync them to a folder on your network or an external endpoint you control. Again, passwords are protected by the 4th amendment. Your fingerprint is not.

Stop sharing videos with tracking data. YouTube, TikTok (dear god, stop using this garbage), and many other video hosting sites have a share button that tracks you and then tracks further shares by others who are NOT you. Strip your URLs before sharing them. Use only the required query string data (example - on YouTube, shares usually include an si=(code) element. When you share, remove everything except for the required video ID. When using the fully qualified www.youtube.com, this usually means deleting everything after and including the first ampersand. When using a shortened youtu.be link, this usually means deleting everything after and including the first question mark.
Example:

https://www.youtube.com/watch?v=EOxERcvYE9g&si=XXXXXXXXXXXXXX
or
https://youtu.be/EOxERcvYE9g?si=XXXXXXXXXXXXXX

Become

https://www.youtube.com/watch?v=EOxERcvYE9g
or
https://youtu.be/EOxERcvYE9g

respectively.

Don’t use photo filter apps, AI enhancement apps, or anything that requires personal data to produce some social token. “It’s fun, everyone’s doing it and I want to see mine!” Nobody is going to care about this shit in a week. Remember BitStrip avatars? Garbage, prepackaged flash art that was reassembled after you handed over the keys to your personal profile? Nobody actually liked anyone else’s but their own. Which means nobody actually liked them. You’d give them enough info to fake a MasterCard support call and get the most dated, ugly garbage to hang on your digital sash. Stop.

Four generic bitstrip avatars. Three are generic white men in generic business clothing, one is a generic Indian or Pakistani man in a slightly more detailed but still generic suit.
6 Seasons and an Identity Theft.

The future of capitalism and the future of humanity cannot coexist. We’re living in that tumultuous between-time, when neither side has laid full claim to the next stage of development and both sides are still under the illusion of a false pact. The average person still thinks technology is a service, not a siphon. The average CEO still thinks that there is more wealth to be pumped from a dry populace. One side will crack and separating your affairs now will do nothing but benefit you, regardless of how the whole thing shakes out. Services are built to incubate product. YOU are the product. Your data. Your eyes. Your time. They sell your own atrophied ability back to you in a neatly packaged, completely standardized, wholly unowned-by-you way. Put up as many roadblocks to them getting all of you for nothing as you can.

Some other videos and resources I’ve enjoyed (GDPR protected. Click Play Video to view):

Saturday, February 21, 2026

I hate Rogue-Likes. Hades is one of my favorite games.

The following overview contains SPOILERS for Hades. Reader discretion is advised.

An image saying I like You, but I don't LIKE-LIKE you. The word like is represented by half of a sprite for the Legend of Zelda enemy, the Like Like. The second two instances are represented by a complete Like Like.
Let your shields down or I’ll let them down for you.

Gaming is Hell. From the AI slop and asset flips that pollute low-bar eshops like (checks notes) Switch and PS5 to the ever-climbing dev cycles making 300 hour experiences that demand 100% of your time for the better part of a year. Gaming is Hell.

But sometimes it can be nirvana. In the case of Rock Band, literally.

A screencap from the Xbox 360 version of Rock Band showing a guitarist with blond bangs over her eyes.
Kurt would be spinning in his grave if he wasn’t cremated.

I’ve never been a fan of -like as a game description. Shorthand can express a ton of information quickly, so it’s useful for conveying a description in an elevator. But it becomes useless as a descriptor in long form reviews or in marketing material. Metroidvania is -like’s granduncle and lost every ounce of meaning the moment it was uttered. What is a Metroidvania? Not Castlevania or Metroid. Castlevania 2 is closer to the modern ideal than the first. Metroid fits the bill, but so do dozens of games that preceded it. And today it’s diluted to the point of kind of meaning any platformer where you back track with upgraded abilities. Almost always 2D, despite Metroid stepping onto the Z axis with GameCube. What’s a Rogue-Like? Rogue certainly isn’t. The concept of dying being part of gameplay is such a minor building block to a complete game, making a genre out of it seems limiting and very, very stupid.

Cards on the table. I hate cards. But I also hate ‘Rogue-likes.’ That doesn’t mean I hate games with the mechanics associated with that shorthand. But I have yet to find a game which has made that phrase a central part of their release push that does much of anything for me. Super Mario Bros. gives you information which makes your next play go a bit further. Just because its buff is your own memory, why isn’t that a Rogue-Like? You must die to get the intel to improve your next run. See what I mean? The whole concept is meaningless due to oversaturation, wibbly-wobbly edges, and mostly, the reductive boxing-in of defining a genre around a single mechanic. I roll my eyes at the term being used in reveals. Or being spat out by denizens of camp GitGud. Or, most egregious of all, on the goddamned box text.

I bring up this annoyance because often - well more often than never, which is too many times - Hades discussions will include the incantation as a way to quickly signal those GG campers to perk up their ears, while the less coordinated, but often more story-hungry of us will tune out. Rogue-like almost had me sleeping on what turned into one of my favorite games of the past 10 years. I almost looked back and watched my love vanish from my vision into the depths of the Underworld. Liam Gallagher would have been so disappointed.

A headshot of Liam Gallagher from the band Oasis. He's wearing a tie-dye style printed windbreaker and posing like he's at Sears in 1985. His hair is from 1964.
Actually, he wouldn’t be disappointed because my name isn’t Noel.

I’ve played a fair number of games carrying the stupid, connotative weight of Rogue-Like and have disliked them all in some fundamental way. At best, with a game like Rogue Legacy, it was an afternoon-waster that didn’t stain my soul, but that wasn’t about to live in my head any longer than it took to see a few level styles. At worst, it was Returnal or similar fare - games that turn progress into a burden because the fall is so far on death that you can’t enjoy the game. You’re watching every step. You’re meticulously scrubbing the entire room for health. You’re not taking any risks and trying to color inside the lines to the point it stops being a game and just becomes Operation Solitaire.

The board game Operation, an electronic game in which players attempt to remove plastic ailments without touching the sides of the small wells they are placed in.
This guy has more problems than a human pug.

Hades is not that. What Hades is is a game deserving of more than a two word hyphenate. First and foremost, Hades is grounded in its own mythology. Which is Greek mythology by way of a very liberal license. In the best way, I must add. Hades follows Zagreus via the Gantzian theory of Zag’s - his friends call him Zag. It’s cool - lineage; being the child of Hades and Persephone. This diverges a tiny bit from his myth of being reborn after being Stretch Armstronged by some Titans having a bit of a play in the yard, but the bones remain. He desires to escape the Underworld his father has built for the souls of humanity and to join the gods on Olympus. To escape, he must traverse always-changing rooms of scaling difficulty, get random boons from gods and goddesses, and frequently give 1/3rd of a very good boy many, many pets.

Cerberus reference art for the game Hades. A red, three-headed dog, with one very happy head, one very angry head, and one head that can't be bothered.
Hims a good hound of hell, yes he is! YES HE IS!

The mythology of Zagreus makes him a fantastic vessel for the gameplay mechanic and oxymoron of progressive death. He doesn’t die. Progress is achieved because death is, by his own myth’s telling, just a reset. Additionally, failure does not result in so massive a setback as to feel like lost time. Death (which is what we’ll call it, but not what it is) is progress. Every run gives you a little something. Longer runs become equally rewarding to succeed or to fail. Rooms nearly always contain some helpful item you can take with you after defeat, and as you make it through more rooms, the run becomes more and more valuable upon expiration. It feels like part of the game because it is part of the game, rather than being a harsh punishment. You are also rewarded with unique dialog and grounding story segments between runs, keeping you engaged. You have multiple collectable buckets that fuel multiple progression systems. Some can be used to power up the character. Some can be used to add more boons to the labyrinthine halls of the Underworld. Some are just trinkets or tokens you can give to characters to get additional permanent modifiers for future runs. The dialog is witty, impeccably acted, and very cohesive. There is a whole game upon which the mechanic of progressive death is hung, along side other equally rewarding mechanics. And that, as some poetist once penned, made all the difference.

Beyond the progression mechanics, the game is rich in playstyle choices. A number of weapons become available very quickly and allow for varied options for defeating the wandering horrors in the catacombs of the damned. Ranged, melee, bull in a china shop…whatever your preferred method of dispatching foes, you’re not too far off from unlocking a weapon that allows you to express your desire to re-kill the dead in your own way. The game does not lock you into classes - you can swap at any time. You can play your current mood and mix things up if the wind changes. You never feel stuck in a choice for very long and that makes the experience much more personal and rewarding.

The graphics are beautiful, hand-drawn, thoughtful representations of the core story. Every character is uniquely represented by their art. Yet they are all fully cohesive with every other. The game is unapologetically horny (complimentary). Gods are sex. They are manifestations of the ego interpreting the drives of the id. Hades makes that statement well, without making it gross or skeevy. The game has an absolute lust to it without being a brown paper bag Switch title where Honeys are Popped or Gals are Gunned.

Whinnie the Pooh sitting in a giant jar of honey.
I’ll Oh Bother your Heffalump if you get your head stuck in my Woozle.

The sound and music are absolute delights. Ambrosia in every word spoken. Thundering beats in time with your attacks give the game a rhythm, intended or otherwise, that really amplifies the experience. The satisfying sound of Zagreus’ dashes, slashes, bashes, and lobs are all tied so well to the animation that even as you’re playing it, the battles seem choreographed. The acting is, as mentioned, top tier. The entire audio experience is truly wonderful and utterly deserving of their many, many award nominations and wins. It’s a soundtrack you’ll want to pick up and put into rotation immediately.

Hades is not an exception to my rule of dismissing rogue-likes. It’s proof that the label bares almost no value in describing a game that has more depth than a teaspoon. To draw the breath to say it, you’ve already given yourself enough runway to accurately depict any game you’re about to besmirch. The jargon does not serve a purpose. It actively diminishes nearly any game to which it’s applied. The fact that Hades and Returnal can both be brought up in the category is enough to disprove it’s worth. But there’s no stuffing that Barbara Eden back into the Michelob tallboy. So, despite my hatred, my message is more for those of us who feel the label is off-putting. If someone voice-vomits that phrase about a new game, wipe it off your shoes and do a little research online before discounting it. While it’s true that usually you’ll find a cheese grater with the words ‘for genital use only’ etched on the side in shaking script at the end of the painbow, sometimes you may find your next favorite game.