posts

vol. 1 vol. 2

Vol 2: 2022–Now

#025

Ratchet: eliminating the meeting

Ratchet v0.3 adds identity-authenticated key exchange — two peers need only each other's public key to establish a forward-secret session. No shared key file. No passphrase. No meeting. Also: a .deb package, systemd service templates, and a three-node mesh deployment.

#025

ChatMail suite: building a hardened Delta Chat relay on eijo.im

Technical write-up covering the installation, DNS, Nginx ALPN multiplexing, monitoring stack (Prometheus, Grafana, mtail, custom textfile collectors), Ansible automation, and systemd service hardening of a Delta Chat chatmail relay. Security scores dropped from 9.6 to 1.3–1.9 across all monitoring services.

#024

Ratchet: a one-time pad for people who type

A Rust binary that encrypts hand-entered text with ChaCha20-Poly1305, ratchets the key forward after every message, signs each frame with Ed25519, heals from compromise via X25519, connects peers over QUIC, and employs software TEMPEST countermeasures to resist electromagnetic and screen-scraping surveillance. How it works, why it works, and what it has in common with a notebook full of random numbers.

#022

librings: concentric gates for data that earns its way in

A Rust library that wraps computation in cryptographically-gated concentric rings. Data passes inward only by proving it belongs there. Each ring produces a unique nonce that becomes the credential for the next.

#021

the router and the keeper

How pg-router and Consort divide the work of running authoritative DNS and distributed object storage across a WireGuard mesh.

#019

Stonebreaker & Hudson: Mind the Gap

Basil Stonebreaker, Isadora Hudson, and Bernard converge on a Tuesday morning in a city that doesn't know it needs them — a nine-chapter story of infrastructure, intuition, and the elegant logic of fit.

#018

2025Q2 Current Projects

A survey of current projects spanning Snowflake ID generators, threat intelligence tools, secure messaging, bot-resistant authentication, and infrastructure helpers.

#016

Stonebreaker and Hudson: Part I

Three shadowy figures navigate a scorched, near-future landscape warped by environmental collapse and the lure of dark crypto-economies.

Vol 1: 2010–2018

#015

Emerging Cyber Ranges: Competition to Compliance

A SANS @ Night session on cyber ranges covering NATO war games, SANS NetWars, JYVSECTEC simulations, the DARPA National Cyber Range, MERIT's Michigan Cyber Range, adversary simulation tools like MITRE CALDERA and Uber Metta, and a proof-of-concept portable range built with Raspberry Pi clusters, OPNsense, WireGuard, and BGP routing modeled after dn42.

#014

Internet of Everything: Hands-On Cyber Security

A SANS @ Night session on IoT security covering legal challenges, the explosive growth of connected devices, IoT attack surfaces from OWASP, passive and active enumeration techniques using Darkstat, Bro, ntopng, nmap, Sysmon, OSSEC, MITRE ATT&CK, and the importance of knowing what you are defending.

#013

Threat Intelligence and Baselining

An updated SANS @ Night session covering the state of cyber security, the 15 Axioms of Traditional Intelligence, CybOX/STIX/TAXII standards including the new STIX 2.0 draft, YARA signatures, OpenIOC, threat intelligence platforms, and the critical importance of baselining with tools like Bro, PRADS, SGUIL, and LOKI.

#012

Threat Intelligence 101: Introduction and Foundations

An entry-level overview of the role and practice of cyber threat intelligence, covering the state of cyber security, CybOX, STIX and TAXII standards, real-world incident analysis, threat intelligence platforms like ThreatConnect and Critical Stack, and a hands-on homework lab with Bro and Security Onion.

#011

Threat Intelligence: Neighborhood Watch for Your Networks

A SANS @ Night session covering the state of cyber security in 2015, what threat intelligence is, the CybOX/STIX/TAXII standards, real-world malware analysis with the Dyreza banking trojan, and hands-on integration of Critical Stack Intel feeds with Bro and Security Onion.

#009

State of Cyber Security

Presented at the Minneapolis Chapter Palo Alto Networks Fuel Users Group Meeting, this talk covers the 2014 breach landscape, threat intelligence sharing through ISAOs, and practical tools for operationalizing indicators of compromise.

#008

ACM Club Cyber Security Workshop

Keynote at the Saint Paul College ACM Club Cyber Security Workshop covering the threat landscape, the defender's advantage, cybersecurity career paths, the Internet of Things, and critical infrastructure security.

#007

DDoS Survival

Presented at the (ISC)2 Twin Cities Area Chapter, this talk covers Distributed Denial of Service attacks -- their origins on IRC, modern threat actors, attack techniques across the OSI stack, and four architectural approaches to defense.

#006

Cloud Security

Presented at the (ISC)2 Twin Cities Area Chapter 2013 Annual Meeting, this talk covers virtualization basics, cloud computing benefits, and the security and privacy risks of entrusting data to third-party providers.

#005

Java Exploits: Offense and Defense

Presented at the (ISC)2 Twin Cities Chapter, this talk examines Oracle Java vulnerabilities, exploit techniques that bypass the Java sandbox, and both technical and policy-based defensive measures.

#004

Security on a Shoestring Budget

Presented at the Nonprofit Technology & Communications Conference, this talk delivers a prioritized 18-step security checklist for resource-constrained organizations, covering everything from password management to vendor oversight.

#003

Why Take the Risk? Doing Risk Assessments Right

Presented at the 30th Annual Minnesota Government IT Symposium, this talk provides a structured approach to IT risk assessments using frameworks like NIST 800-30, ISO 27005, FAIR, and OCTAVE, covering threat identification, vulnerability analysis, impact assessment, and risk treatment planning.

#002

Incident Handling, Forensics and Hacking Techniques

A SANS community presentation covering the six-phase incident response process, forensic toolkit overview, evidence handling procedures, data hiding techniques, and the forensic implications of solid state drives.

#001

ISO Focus+ Article: Plugging Security Gaps

Published in ISO Focus+ magazine, this article by Matthew J. Harmon and Natascha E. Shawver examines the explosive adoption of RFID technology, its security vulnerabilities, and the international standards being developed to address them.