Latest Journal
View all →The Exabyte Time Bomb: HNDL and the Shelf-Life of a Secret
•
Security Cryptography QuantumComputing
An architectural analysis of 'Harvest Now, Decrypt Later' (HNDL), the mathematics of Post-Quantum Cryptography, and the socio-economic fallout of Q-Day.
The Analog Ghost: Numbers Stations and the Architecture of Absolute Trust
•
Security Cryptography Networking
A technical analysis of HF radio propagation, the mathematics of the One-Time Pad, and why the most secure comms in the world still use a 1920s broadcast model.
The Geography of Information: From TAT-8 to the Neutrino Horizon
•
Infrastructure Networking History
An architectural deep-dive into the physics of long-haul glass, the social friction of millisecond arbitrage, and the subatomic future of interconnectivity.