Series
May 6, 2026
MCP Security for AI Agents
Start here for the supply-chain and runtime trust risks that appear when agents depend on MCP servers.
Writing archive
Technical essays, security thinking, and long-form notes spanning 2018 to 2026.
This archive mixes practical application security, AI systems thinking, and philosophy of technology. The current center of gravity is AI agent security: how autonomous systems see, reason, remember, and act through tools.
Start here
A guided path through the strongest thread in the archive: MCP supply-chain risk, epistemic security, production threat modeling, and human verification.
Series
May 6, 2026
Start here for the supply-chain and runtime trust risks that appear when agents depend on MCP servers.
Series
May 4, 2026
The control-plane argument for provenance, uncertainty, source integrity, memory hygiene, and verification.
Series
Mar 4, 2026
A practical production model for tool abuse, memory poisoning, delegation storms, eval drift, and security SLOs.
Series
May 3, 2026
The philosophical security risk behind agent delegation: losing the ability to justify what we believe.
Archive
For topic-based browsing, use the tags page.
engineering
May 9, 2026
Grinding inside an extractive system does not change the payoff matrix. It only increases throughput for someone else's infrastructure.
security
May 8, 2026
BOLA is not solved by asking every developer to remember object-level checks. It is solved by making authorization a reusable platform capability.
AI
May 6, 2026
MCP servers are not harmless plugins. They are executable trust boundaries that shape what AI agents see, believe, and do.
AI
May 4, 2026
AI agents do not only need runtime security. They need epistemic security: controls for provenance, uncertainty, evidence, memory, and human verification.
AI
May 3, 2026
AI agents may not just change how we work. They may weaken our ability to know, verify, and justify what we believe.
security
Mar 8, 2026
A practical guide to using game theory in cybersecurity, from Nash and Stackelberg models to APT defense, forensic readiness, and LLM-driven simulations.
AI
Mar 4, 2026
A practical framework for threat modeling autonomous AI agents in production, with concrete attack paths, controls, and measurable security SLOs.
engineering
Mar 2, 2026
Code review is a historical approval gate that simply no longer matches the shape of modern work. Here is why we need to pivot.
AI
Feb 22, 2026
A technical comparison of classical ANN pipelines and transformer LLMs for vulnerability detection.
AI
Oct 10, 2025
Stop Vibe coding: Why true engineers are now doing Vibe engineering
AI
Jun 29, 2025
The world of AI is moving fast. Every day, we see amazing new tools like AutoGen and CrewAI that let us build teams of AI agents to get work done. These tools are powerful, but ...
philosophy
Jun 30, 2024
Why do we suffer? A look at injustice without a God
technology
Feb 12, 2024
In the shadows of the late 20th century, Ted Kaczynski, infamously known as the Unabomber, embarked on a nationwide bombing campaign that terrorized America for nearly two decad...
philosophy
Dec 31, 2023
Introduction
philosophy
Jul 23, 2023
AI
Jul 17, 2023
Introduction
philosophy
Jul 9, 2023
Are we just machines?
culture
Jul 7, 2023
Last week I watched The Avengers: Infinity War again after 5 years and it sparked me why Thanos could be right.
security
Jun 14, 2023
Application security should not be a late-stage interruption. The mature AppSec move is to improve developer feedback loops, reduce cognitive load, and build secure defaults int...
philosophy
Jun 7, 2023
Advaita Vedanta, one of the philosophical schools of Hinduism, presents a profound vision of reality that challenges our everyday perceptions and encourages us to explore the de...
science
Feb 27, 2023
In the article “Man’s Greatest Achievement” published in the New York American on July 6, 1930, Nikola Tesla outlines his vision for the future of science and technology, specif...
culture
May 1, 2022
“Thursday, October 31st. The city streets are crowded for the holiday. Even with the rain. Hidden in the chaos is the element, waiting to strike like snakes. And I’m there too. ...
philosophy
Jul 31, 2021
The Sanskrit word akasha, translated as both “ether” and “space”, refers specifically to the vibratory element that is the subtlest in the material world, the “screen on which t...
science
Jul 14, 2021
Memory works (to put it simply) in 3 stages: attention, encoding (storing/associating with other info), and retrieval(remembering).
philosophy
Jul 12, 2021
1. What is a Socratic Dialogue?
math
Apr 12, 2020
Introduction
security
Apr 30, 2019
Knowledge of x86 is important in security fields like malware analysis, vulnerability research and exploit development. The only prerequisite is to know the basics of C or C bas...
security
Mar 15, 2018
Types of memory exploit mitigation techniques