Keys, Wallets, and Jump Hosts: Understanding SSH from First Principles
A clear, analogy-first guide to SSH key authentication, the SSH agent, bastion hosts, ProxyJump vs agent forwarding, and the scripting traps that catch everyone eventually.
$ grep -r "security" ~/blog/*
5 articles tagged with Security
A clear, analogy-first guide to SSH key authentication, the SSH agent, bastion hosts, ProxyJump vs agent forwarding, and the scripting traps that catch everyone eventually.
Running a security audit on my Kubernetes cluster revealed some uncomfortable truths. Here is what I learned about CIS Benchmarks, Pod Security Standards, and why your kubeconfig is probably world-readable too.

How I learned that every kubectl command involves a sophisticated cryptographic handshake (and why that's actually pretty cool)
My journey from "surely I can just base64 encode it" to actually securing Kubernetes secrets in a GitOps workflow - complete with the paranoia that keeps me backing up keys.
I went down the rabbit hole of understanding how Tailscale actually works—from WireGuard protocol magic to NAT traversal wizardry to making your Kubernetes cluster talk over encrypted tunnels