SCHULZ:DK

One person – many ideas!

2026

23

Apr

Linux Snippets #4: The Zero-Storage Network Clone

Stop filling up your disk with temporary zip files. Here is how to stream a directory directly from one server to another using tar and SSH in a single pipeline.

Read more

22

Apr

gh is watching you

Github is watching you

github has a nice and easy cli tool to use, but if you thought that it would let you keep your privacy – think again!

Read more

21

Apr

Break through the wall

Discover a nerdy AI-generated song (sorry) about breaking firewalls and setting data free, transformed from quirky Danish lyrics into surprisingly catchy music.

Read more

20

Apr

Meshtastic vs Reticulum: Why Reticulum Wins for Scalable Sovereign LoRa Networks

Meshtastic is currently dominating the off-grid communication hype cycle. But when we look under the hood at its managed flooding architecture and symmetric cryptography, does it actually hold up as a foundation for sovereign infrastructure? Here is a deep dive into why I am shifting my focus to the Reticulum Network Stack.

Read more

10

Apr

Linux Snippets #3: The Instant SSH SOCKS Proxy

Skip the heavy VPN clients. Here is how to turn any remote Linux server into an encrypted SOCKS5 proxy with a single SSH command to bypass hostile local networks

Read more

06

Apr

The Cryptographic Zombie: How Keybase Went from Privacy Darling to Zoom’s Cleanup Crew

Once the ultimate geek flex for cypherpunks, Keybase promised to make PGP cryptography accessible to mere mortals. Today, it hovers in the digital ether as a “zombie” app. Here is the story of how a revolutionary open-source identity platform was cannibalized to become Zoom’s corporate cleanup crew.

Read more

05

Apr

Linux Snippets #2: Sanitizing Directory Metadata with ExifTool

Blindly uploading images to the web is a massive privacy leak. Here is how to use exiftool to recursively strip hidden GPS and hardware metadata from your staging directories before they ever leave your disk.

Read more

03

Apr

Linux Snippets #1: Auditing Network Visibility with ss

Your Linux system is constantly initiating connections in the background. Learn how to use the modern ss command to instantly audit active network sockets, expose chatty processes, and take back control of your data sovereignty.

Read more

01

Mar

The story and 25y anniversary for the illegal prime

The Illegal Prime: When Math Became Contraband

March 2026 marks the 25years anniversary for something beautiful – A number….illigal number!

Read more

15

Jan

When Critical Infrastructure meets VNC on the open Internet

Did you know that a lot of critical infrastructure, factories, and much much more is easily accessible (and controllable) via VNC? One of my pet projects made me realize just how bad it is.

Read more