Articles

Latest articles and thoughts

14 min read

Why Your LLM Keeps Inventing JSON Keys (And What I Did About It)

I was spending more time debugging JSON parsing failures than building features. After benchmarking 10 LLMs across 4 scenarios, I discovered the real problem wasn't the models - it was my schema design. Here's what I learned.

TechnologyAIWeb Development
5 min read

Stop Manually Tracking Development Ports: I Built an Automated Solution

Tired of manually tracking ports across development projects? I was maintaining a text file like a caveman until LLM agents forced me to automate. Here's devports, the npm package that eliminates port conflicts across git worktrees and lets AI agents manage multi-service development environments without manual intervention.

TechnologySecurity
13 min read

3 Months of AI-First Development: The Real Results and What I Learned

The honest results from building with AI-optimised architecture using TypeScript, Vite, and Radix UI: what worked, what failed, and the hidden dangers that almost derailed everything.

TechnologyAIArchitectureDevelopment
8 min read

How AI-First Architecture Made Me 3x Faster: The Design Decisions That Changed Everything

After ditching Next.js for radical separation of concerns, I'm shipping features 3x faster with AI assistance. Here's the architecture that made AI actually useful—and why returning to 'waterfall' practices is the secret.

TechnologyAIArchitectureDevelopment
7 min read

Understanding OAuth 2.0 Refresh Tokens

A comprehensive guide to OAuth 2.0 refresh tokens using a theme park analogy. Learn how refresh tokens balance security with user experience, and understand token rotation for detecting compromised credentials.

TechnologySecurity
20 min read

Social Engineering an LLM

LLMs are getting better, they say. And I agree. I'm finding them to be more helpful with coding now than a few years ago. They retain context a little better, drift less, and tend to hallucinate less. But what happens when someone with malicious intent uses the same techniques that make LLMs helpful to manipulate them into crossing ethical boundaries?

AISecurity
6 min read

Step-up your Streaming with these Seven Suggestions

When exploring online alternatives - the digital analogues, so to speak - the adoption of prerecorded video and live streaming has rocketed to the extent that worldwide supplies videography equipment ...

CommunityConferenceEducationStreaming
4 min read

Why access to retained data in civil proceedings should not be permissible

- - - - - -

OpinionPrivacy
3 min read

You share your life on Facebook...

Somewhat related to the “if you’ve got nothing to hide, you’ve got nothing to fear” argument.

Data RetentionData SovereigntyOpinionPoliticsPrivacySecuritySurveillance
5 min read

Why I Moved from Signal to WhatsApp

It's probably one of the major contributors to making secure, encrypted, safe communication accessible to all. I recommend it to anyone, if you're not already encrypting your communications.

FreedomOpen SourceOpinionPrivacySecurity
4 min read

How Apple can Ethically unlock the iPhone for the FBI

### Preamble

TechnologyPrivacySecurity
3 min read

The Problem With "Those Who Are Not For Us Are Against Us"

> There is no more neutrality in the world. You either have to be part of the solution, or you're going to be part of the problem — Eldridge Cleaver

KindnessOpinion