Articles
Latest articles and thoughts

Why Your LLM Keeps Inventing JSON Keys (And What I Did About It)
I was spending more time debugging JSON parsing failures than building features. After benchmarking 10 LLMs across 4 scenarios, I discovered the real problem wasn't the models - it was my schema design. Here's what I learned.
Stop Manually Tracking Development Ports: I Built an Automated Solution
Tired of manually tracking ports across development projects? I was maintaining a text file like a caveman until LLM agents forced me to automate. Here's devports, the npm package that eliminates port conflicts across git worktrees and lets AI agents manage multi-service development environments without manual intervention.

3 Months of AI-First Development: The Real Results and What I Learned
The honest results from building with AI-optimised architecture using TypeScript, Vite, and Radix UI: what worked, what failed, and the hidden dangers that almost derailed everything.

How AI-First Architecture Made Me 3x Faster: The Design Decisions That Changed Everything
After ditching Next.js for radical separation of concerns, I'm shipping features 3x faster with AI assistance. Here's the architecture that made AI actually useful—and why returning to 'waterfall' practices is the secret.

Understanding OAuth 2.0 Refresh Tokens
A comprehensive guide to OAuth 2.0 refresh tokens using a theme park analogy. Learn how refresh tokens balance security with user experience, and understand token rotation for detecting compromised credentials.

Social Engineering an LLM
LLMs are getting better, they say. And I agree. I'm finding them to be more helpful with coding now than a few years ago. They retain context a little better, drift less, and tend to hallucinate less. But what happens when someone with malicious intent uses the same techniques that make LLMs helpful to manipulate them into crossing ethical boundaries?

Step-up your Streaming with these Seven Suggestions
When exploring online alternatives - the digital analogues, so to speak - the adoption of prerecorded video and live streaming has rocketed to the extent that worldwide supplies videography equipment ...

Why access to retained data in civil proceedings should not be permissible
- - - - - -

You share your life on Facebook...
Somewhat related to the “if you’ve got nothing to hide, you’ve got nothing to fear” argument.

Why I Moved from Signal to WhatsApp
It's probably one of the major contributors to making secure, encrypted, safe communication accessible to all. I recommend it to anyone, if you're not already encrypting your communications.

How Apple can Ethically unlock the iPhone for the FBI
### Preamble

The Problem With "Those Who Are Not For Us Are Against Us"
> There is no more neutrality in the world. You either have to be part of the solution, or you're going to be part of the problem — Eldridge Cleaver