SCHULZ:DK

One person – many ideas!

2026

22

Apr

gh is watching you

Github is watching you

github has a nice and easy cli tool to use, but if you thought that it would let you keep your privacy – think again!

Read more

21

Apr

Break through the wall

Discover a nerdy AI-generated song (sorry) about breaking firewalls and setting data free, transformed from quirky Danish lyrics into surprisingly catchy music.

Read more

20

Apr

Meshtastic vs Reticulum: Why Reticulum Wins for Scalable Sovereign LoRa Networks

Meshtastic is currently dominating the off-grid communication hype cycle. But when we look under the hood at its managed flooding architecture and symmetric cryptography, does it actually hold up as a foundation for sovereign infrastructure? Here is a deep dive into why I am shifting my focus to the Reticulum Network Stack.

Read more

10

Apr

Linux Snippets #3: The Instant SSH SOCKS Proxy

Skip the heavy VPN clients. Here is how to turn any remote Linux server into an encrypted SOCKS5 proxy with a single SSH command to bypass hostile local networks

Read more

06

Apr

The Cryptographic Zombie: How Keybase Went from Privacy Darling to Zoom’s Cleanup Crew

Once the ultimate geek flex for cypherpunks, Keybase promised to make PGP cryptography accessible to mere mortals. Today, it hovers in the digital ether as a “zombie” app. Here is the story of how a revolutionary open-source identity platform was cannibalized to become Zoom’s corporate cleanup crew.

Read more

05

Apr

Linux Snippets #2: Sanitizing Directory Metadata with ExifTool

Blindly uploading images to the web is a massive privacy leak. Here is how to use exiftool to recursively strip hidden GPS and hardware metadata from your staging directories before they ever leave your disk.

Read more

03

Apr

Linux Snippets #1: Auditing Network Visibility with ss

Your Linux system is constantly initiating connections in the background. Learn how to use the modern ss command to instantly audit active network sockets, expose chatty processes, and take back control of your data sovereignty.

Read more

01

Mar

The story and 25y anniversary for the illegal prime

The Illegal Prime: When Math Became Contraband

March 2026 marks the 25years anniversary for something beautiful – A number….illigal number!

Read more

15

Jan

When Critical Infrastructure meets VNC on the open Internet

Did you know that a lot of critical infrastructure, factories, and much much more is easily accessible (and controllable) via VNC? One of my pet projects made me realize just how bad it is.

Read more

2025

06

Nov

Framework backs the wrong crowd

The Framework Saga – When the laptop you love, backs the wrong crowd

Framework built its reputation on openness and repairability, but when “open” starts to include the far-right, things get messy. Their sponsorship of DHH’s Omarchy project raises uncomfortable questions about where ideals end and ideology begins. It’s a reminder that even modular laptops can carry moral baggage, and sometimes the hardest part to replace isn’t a component – it’s integrity.

Read more