Accidentally ran rm on a massive log file or a database while a process was still writing to it? Before you panic, learn how to use lsof to find the ‘ghost’ file in the /proc filesystem and snatch your data back.
Apr
Accidentally ran rm on a massive log file or a database while a process was still writing to it? Before you panic, learn how to use lsof to find the ‘ghost’ file in the /proc filesystem and snatch your data back.
Apr
Stop filling up your disk with temporary zip files. Here is how to stream a directory directly from one server to another using tar and SSH in a single pipeline.
Apr
github has a nice and easy cli tool to use, but if you thought that it would let you keep your privacy – think again!
Apr
Discover a nerdy AI-generated song (sorry) about breaking firewalls and setting data free, transformed from quirky Danish lyrics into surprisingly catchy music.
Apr
Meshtastic is currently dominating the off-grid communication hype cycle. But when we look under the hood at its managed flooding architecture and symmetric cryptography, does it actually hold up as a foundation for sovereign infrastructure? Here is a deep dive into why I am shifting my focus to the Reticulum Network Stack.
Apr
Skip the heavy VPN clients. Here is how to turn any remote Linux server into an encrypted SOCKS5 proxy with a single SSH command to bypass hostile local networks
Apr
Once the ultimate geek flex for cypherpunks, Keybase promised to make PGP cryptography accessible to mere mortals. Today, it hovers in the digital ether as a “zombie” app. Here is the story of how a revolutionary open-source identity platform was cannibalized to become Zoom’s corporate cleanup crew.
Apr
Blindly uploading images to the web is a massive privacy leak. Here is how to use exiftool to recursively strip hidden GPS and hardware metadata from your staging directories before they ever leave your disk.
Apr
Your Linux system is constantly initiating connections in the background. Learn how to use the modern ss command to instantly audit active network sockets, expose chatty processes, and take back control of your data sovereignty.
Mar
March 2026 marks the 25years anniversary for something beautiful – A number….illigal number!