Clear thinking at trust boundaries.
Writing on security architecture—threat models, controls, and tradeoffs—alongside general essays, fiction, shipped projects, and receipts when claims need proof. Static site; no accounts, no trackers.
Articles
Notes, essays, and longer-form thinking.
Fiction
Short pieces, serials, and narrative play.
Projects
Tools, repos, and things shipped into the world.
Security
Architecture, reviews, and field notes from the job.
Receipts Available
Sources, captures, and citations behind specific claims.