Things I build, break, fix, and write about

28 April 2026
Testing Proxmox restores before production relies on them

A green job in a Proxmox backup guide means very little until the restore boots, logs in, and serves traffic. I have trusted the dashboard before, only to find the archive was fine and the recovery was not, which is a poor way to learn anything.

27 April 2026
Network segmentation for vehicle data in Home Assistant

Modern cars are noisy little computers, and vehicle telemetry isolation only works if you treat them that way from the start. I put the car on its own...

26 April 2026
Isolating Android on a VLAN with firewall rules and split

I would not migrate an Android phone into my homelab blind. A clean Android homelab firewall DNS split, with VLAN isolation and hard DNS rules, keeps...

26 April 2026
Security Advisory – 24 Apr 2026

Daily security advisory summary for 24 Apr 2026

Latest blog posts you might like

30 March 2026
Blink Outdoor 4 camera + 3 more Amazon tech bargains

Discover the Blink Outdoor 4 camera and three more tech deals this week.

28 March 2026
Azure credits documentation fails to flag marketplace

I deployed Claude via Azure AI Foundry assuming startup credits would cover it. The $1,600 invoice arrived mid-cycle, charged directly to my card. Microsoft's documentation never mentions that...

25 March 2026
Setting up headless Chrome in ARM64 containers without

Google doesn't publish ARM64 Chrome. Chromium fills that gap on Debian-based ARM64 Linux systems, and any CDP automation library works identically against it. Pin the version, fix `/dev/shm`, work...

24 March 2026
Detecting spoofed VPN downloads: a practical approach

The trust UI lies by omission. A valid signature proves only that someone with a private key signed the file, not that the signer is the vendor you intended. Storm-2561 distributes trojanised VPN...

23 March 2026
Stellar Blade (PS5) + 2 more Amazon tech bargains

Check out these top Amazon deals including Stellar Blade for PS5 at £28.6.

22 March 2026
Petabyte leaks start with uncontrolled backup access

A single compromised credential reaching both production and backup storage across the same network boundary turns one day's data loss into months or years. Isolation done badly is barely isolation at...

21 March 2026
Video file naming and structure for decade-scale retrieval

A video archive you cannot read a decade later is just a warm drive waiting to die. Ambiguous filenames and missing verification schedules kill cold storage video archival; fix those two things, and...

20 March 2026
Backup retention policy: writing it down saves arguments

A backup schedule that works is not the same as a documented one. When recovery fails and a client asks why their data is gone, a working cron job and a vague memory are not a defence; a policy...

16 March 2026
Object storage encryption at rest in homelab setups

Encryption without object lock is a half-measure. A misconfigured script or compromised service account can still wipe everything, which is why S3-compatible storage on a homelab needs layered defence...

16 March 2026
Ring Outdoor Camera Battery + 2 more Amazon tech bargains

Discover the Ring Outdoor Camera Battery and two more Amazon tech deals this week.