Seven grids. One practice.
Every post is mapped to a Grid — a thematic bucket that organizes ideas by domain. Pick the one that matches what you're working on.
Cybersecurity, Zero Trust, threat intel, and defensive architecture that matches real threat models — not compliance checklists.
Infrastructure, cloud, networks, and data platforms. The unglamorous foundations that determine whether everything else works.
Privacy engineering, Tor research, and dark-web infrastructure — including DarkPulse Security, operated under a separate pseudonymous identity.
AI and automation in IT operations. What actually works in production versus what's vendor theater. Skeptical, practical, hands-on.
Industry watch and threat intel — auto-refreshed every 6 hours from sources worth reading. Signal, not noise.
Home-lab experiments, tool reviews, and hands-on how-tos. If I'm writing about it, I've actually run it.
Personal, hobbies, and off-duty thoughts. Not everything has to be about systems.
The dark web, studied in practice.
To understand adversarial thinking, you have to operate in the same threat model it assumes. Here's what I built.
DarkPulse Security
A privacy-first cybersecurity news aggregator operating as a Tor hidden service on a Whonix-isolated infrastructure. Aggregates 18+ public feeds, mirrors the CISA KEV catalog, tracks ransomware groups, and publishes weekly long-form case files on landmark cyber events.
Operated under the pseudonym TheMacwan — a
separate operational identity kept intentionally distinct from my professional
profile here.
From the blog.
Practitioner notes, reflections, and analyses across the grids.
Why I Built a Dark Web Research Site (and What I Learned)
A year of studying privacy engineering by building one. Lessons on Whonix, Tor hidden services, and the discipline of operational isolation.
The CISA KEV Catalog as a Prioritized Patch Backlog
Most patch management programs drown in CVEs. The KEV list is the strongest signal most teams aren't using well. Here's how.
AI in IT Operations: A Reality Check from the Trenches
What actually works, what's vendor theater, and where I think the genuine leverage lives over the next two years.
Zero Trust Is Harder Than Vendors Admit
The concept is sound; implementations are often theatrical. A pragmatic path through the Zero Trust journey.
Work in IT? Let's compare notes.
I connect with fellow practitioners, researchers, and students. If any of this resonates — reach out.