Things I build, break,
fix, and write about

22 March 2026
AI
Petabyte leaks start with uncontrolled backup access

A single compromised credential reaching both production and backup storage across the same network boundary turns one day's data loss into months or years. Isolation done badly is barely isolation at all.

Read more
21 March 2026
AI
Video file naming and structure for decade-scale retrieval

A video archive you cannot read a decade later is just a warm drive waiting to die. Ambiguous filenames and missing verification schedules kill cold storage video archival; fix those two things, and the rest is manageable.

Read more
20 March 2026
Tech
Backup retention policy: writing it down saves arguments

A backup schedule that works is not the same as a documented one. When recovery fails and a client asks why their data is gone, a working cron job and a vague memory are not a defence; a policy document and a tested restore procedure are.

Read more
16 March 2026
AI
Object storage encryption at rest in homelab setups

Encryption without object lock is a half-measure. A misconfigured script or compromised service account can still wipe everything, which is why S3-compatible storage on a homelab needs layered defence: encryption at rest, API-enforced write and delete rules, and backups that survive the worst realistic failure.

Read more
16 March 2026
Deals
Ring Outdoor Camera Battery + 2 more Amazon tech bargains

Discover the Ring Outdoor Camera Battery and two more Amazon tech deals this week.

Read more
16 March 2026
AI
Document what your backup excludes, not just what it covers

I've built backup jobs that looked fine right up until the restore failed. The gap between what you think is covered and what actually is covered lives in the space where documentation should be; write down what is excluded, not just what you protect, and you stop arguing about it later.

Read more
16 March 2026
AI
Docker Compose for portable homelab deployments

Vendor lock-in creeps in quietly: a pinned cloud dashboard, a backup tool in a proprietary format, a reverse proxy config hardcoded to an IP nobody wrote down. By the time you need to migrate, the compose file is the only thing you trust, and even that can lie to you.

Read more
15 March 2026
AI
Mitigating Win+X paste attacks with PowerShell settings

Use this blueprint to harden Windows Terminal and PowerShell, reduce exposure and detect post-compromise behaviour. You get clear settings, AppLocker and WDAC guidance, logging checks and audits you can run to implement Win+X paste attack hardening now.

Read more
10 March 2026
Deals
Amazon Fire TV Stick 4K Max + 3 more Amazon tech bargains

Discover the Amazon Fire TV Stick 4K Max and three more tech deals for your home.

Read more
10 March 2026
AI
Assessing surveillance risks with Microsoft AI tools

Explore the critical landscape of data privacy and compliance in surveillance, focusing on lessons from Microsoft and ICE's increasing data utilisation.

Read more