__         _____                               
    |__| ______/ ______  _  __   ___________  ____  
    |  |/     \   __\\ \/ \/ /  /  _ \_  __ \/ ___\ 
    |  |  Y Y  |  |   \     /  (  <_> |  | \/ /_/  >
/\__|  |__|_|  |__|    \/\_/ /\ \____/|__|  \___  / 
\______|     \/              \/            /_____/  
+------------------------------------------------------------------------------+
|                                                                              |
|                             MY PERSONAL BLOG                                 |
|                                                                              |
|  Articles, research findings, debunking misinformation (there is a lot of-   | 
|  -it!), and whatever I might find interesting this week. Currently a W.I.P.  | 
|                                                                              |
|                                                                              |
|          .--------------------------------------------------------.          |
|          |                                                        |          |
|          |  "The best way to find out if you can trust somebody   |          |
|          |   is to trust them." - Ernest Hemingway                |          |
|          |                                                        | .--.     |
|          '--------------------------------------------------------'|o_o |    |
|                                                                    |:_/ |    |
|                                                                   //   \ \   |
|                                                                  (|     | )  |
+------------------------------------------------------------------------------+
BLOG
________________________________________________________________________________

- @/blog/20250308a SecureBlue: A security-focused Linux operating system

________________________________________________________________________________

This space features in-depth articles covering cybersecurity research, privacy advocacy, Linux system administration, and critical analysis of tech industry trends. Each post is thoroughly researched and fact-checked.

Got suggestions for topics to cover? Contact me via the contact page. All forms of contribution are welcome. And please don't hesitate to correct me if I mess something up.