Archive
All Posts
Filter mission logs by category and tags. This index keeps every published post discoverable with stable `/posts/*` URLs.
16 results
web · Mar 7, 2026
Hardening Traefik with CrowdSec forwardAuth in a Homelab Reverse-Proxy Stack
Practical homelab guide to wire Traefik forwardAuth with CrowdSec, validate it, and handle the security tradeoffs before production.
tools · Feb 28, 2026
Secure Remote Docker Deployments with Proton Pass CLI, Docker Contexts, and SSH
Idempotent remote Docker deploys over SSH with Proton Pass CLI secrets, including the security tradeoffs and mitigations that actually matter.
tools · Feb 21, 2026
Pi-hole + Unbound Behind Traefik with a Clean /admin Redirect
How this homelab publishes Pi-hole admin via Traefik while keeping DNS local, with practical hardening steps for the risky defaults.
tools · Feb 14, 2026
Running Paperless-ngx Behind Traefik with Internal Network Segmentation (Redis + Postgres)
A homelab-backed Paperless-ngx + Traefik deployment with segmented Redis/Postgres networks, concrete checks, and security hardening lessons.
ai · Feb 7, 2026
Durable AI-Agent Memory in a Homelab Repo with MCP Setup/Check Scripts
Use setup/check scripts and a Dockerized MCP memory server to keep agent context durable while avoiding secret leakage into repo memory.
web · Nov 14, 2025
Setting Up a Docker Swarm AI Agent Cluster for Security Research
Build AI agent lab on Raspberry Pi with Docker Swarm: encrypted networks, HMAC auth, and security monitoring. Production-grade patterns on $600 hardware.
ai · Nov 13, 2025
10 Lessons from Building an AI Agent Security Lab
Lab lessons: prompt injection unsolvable, vendor lock-in is operational risk, agility is control. Breaking systems teaches security faster than theory.
ai · Nov 12, 2025
AI Security Challenges We're Not Ready For
Unprepared for autonomous agents, model poisoning, deepfakes, and AI arms races. Security frameworks, certifications, and playbooks lag behind capabilities.
learning · Nov 11, 2025
From USS Tennessee to AI Security: A Cybersecurity Journey
From USS Tennessee ISSM to AI security: how traditional cybersecurity expertise became both foundation and limitation for securing AI systems.
ai · Nov 10, 2025
How to Structure Data for AI Without Creating Security Nightmares
Balance AI context with security: structured data, sanitization, RAG, and least-privilege. Practical patterns for safe AI without data exfiltration risks.
ai · Nov 9, 2025
Building a Multi-Model AI System for Security and Agility
Multi-model architecture with Claude, GPT-4, and GLM enables rapid provider switching, cost optimization, and protection against vendor lock-in.
ai · Nov 8, 2025
Vendor Lock-In is Your Biggest AI Security Risk
Cloud AI providers control your infrastructure completely. Multi-vendor architecture isn't optional—it's a security control for operational resilience.
ai · Nov 7, 2025
I Monitored a Chinese AI Model for Bias. Here's What I Found.
GLM 4.6 monitoring revealed 12% geographic bias, narrative injection, and trust-building patterns. Empirical security research on lower-cost AI model behavior.
ai · Nov 6, 2025
Prompt Injection: The SQL Injection of AI (But Unsolvable)
Prompt injection is the defining LLM vulnerability with no parameterized query fix. Unlike SQL injection, it may be theoretically impossible to solve.
ai · Nov 5, 2025
Why AI Security Broke Traditional InfoSec Playbooks
Traditional CISSP frameworks fail against prompt injection and unsolvable AI vulnerabilities. Here's why agility matters more than stability in AI security.
web · Feb 1, 2025
Why We Chose Astro for Our Showcase Site
Exploring Astro's islands architecture, content collections, and why it's perfect for static sites with dynamic needs.