Recent Posts

Skynet: Towards Synthetic Neurobiology

The original idea was a joke. I was looking at LLM loops and thinking about how they map onto Elixir’s actor model — GenServers that receive messages, process them, maybe spawn new processes. …

Prism: Why I built my own search engine

At some point at work I had to delete a large Elasticsearch index. Straightforward task, you’d think. The index had grown out of control, nothing useful in it anymore, and it was eating disk. …

Checkout pull requests from github locally

Sometimes for various reasons I want to get one or more pull requests from github to my local copy of the repository. In the beginning I went as far as checking out the repository of whoever wrote the …

Dangerous toys: Anything to ed25519 (SSH Keys)

Disclaimer: I’m not a professional cryptographer or anything like that, I’ve found it interesting to dig deep into ECC and alike crypto, use at own risk and such :) BIG NOTE: After much …

I2P outproxies: How to and General information

What is a outproxy? A outproxy would be the same as a Tor exit node for http(s). It’s a way to allow your tunnel clients to exit via your router to the “clearnet”. Background History …

Gitifying I2P: How to make git clone resumable

Have you ever cloned a git repository on a bad internet connection? I have, it don’t work. When I lived in the Philippines for a year and a half, I had to clone repositories to a server of mine …

Russia, shame on you! Censorship is lame.

Or in Russian; Позор Российскому руководству! Цензура это полный бред. NOTE: In the bottom, this text is translated into Russian by orignal from I2Pd. Thanks to him. I barely knows a word Russian …

R.I.P Return-oriented Programming (ROP)

Intel has this Control-flow Enforcement Technology (CET), as of October 20th 2017 there are no Intel processors currently being sold that support it yet. But it will be available sooner or later- …

RSA key strength and math

TL;DR Since time is a factor here, \(2048\) bit is probably fine for most systems and users as long as it is replaced often, like let’s encrypt does with it’s ninety-day lifetimes. However …