DevOps, Security, Whatever

SEC-T 0x11 2025

SEC-T 2025 Stockholm Conference Notes

It was a good one.

Posted

#Articles

Woman in black and white.

My Two Years of AI Experimentation

What worked, what didn’t, and all the weird stuff in between.

Posted

#Articles

Two Solo U2F tokens, red and black, created out of triangles.

Making Identical U2F Hardware Security Keys

Identical U2F authentication tokens can be made, but not really...

Posted

#Articles

Turning E-paper Book Reader into Digital Picture Frame

Recycling old PocketBook 624 e-book reader to show a bunch of images. #einktober

Posted

#Articles

Splitting Cryptographic Key with OpenSSL and Bash

Use split key split with openssl and bash to protect secrets in CI/CD pipeline.

Posted

#Articles

Protecting The Company

What could a company do to protect itself from aggressive threats that are a byproduct of a geopolitical turmoil.

Posted

#Articles

Automating Internal Certificate Issuance With ACME-based Certificate Authority

Lessons learned from running Let's Encrypt Boulder certificate authority software in the company.

Posted

#Articles

Lessons Learned Using Vault As A Secret Store

Lessons learned from the multi year operation of the HashiCorp Vault Open Source deployment.

Posted

#Articles

Notes On Threat Modeling

Notes on threat modeling from a defender's perspective.

Posted

#Articles

Photo by Jon Moore https://unsplash.com/photos/bBavss4ZQcA

Directions Of The Cybersecurity Industry

Covid crisis and the forced work-from-home comes with the rapid transformation of a traditional established company to an online only business with most of the work force working remote.

Posted

#Articles