
Architecture and operational guidance for building authentication systems that limit damage, detect compromise, and recover cleanly.
Software, security, systems, music.
Essays on software engineering, mobile and backend security, architecture, older systems, and the occasional adjacent obsession.
Content expressed is my own and does not reflect the opinions of any entity.
Featured Essay

Architecture and operational guidance for building authentication systems that limit damage, detect compromise, and recover cleanly.
Browse the Archive
Latest Entries

