Authorization Is the Hardest Problem in Security
Authentication proves identity. Authorization determines action boundaries, and that complexity grows faster than most systems do.
Read ArticleThoughts on technology, recipes, music and creative processes. A mix of tutorials, opinions and analyses.

Rate limiting looks like arithmetic in tutorials, but in production it allocates scarce capacity, encodes fairness assumptions, and shapes client behavior under stress.

RAG became the default way to ground LLMs on enterprise data, but that did not solve AI reliability. It exposed a harder reality: retrieval is infrastructure, and the real work is systems design, governance, and evaluation.

Shadow AI is not primarily a compliance failure. It is what happens when capability arrives before permission, and when demand outruns an organization's ability to govern what is already being used.

Some low-output days are not failures. They are recovery days. The difference between drift and compounding is whether you know how to protect your creative system when capacity drops.

Authentication proves identity. Authorization determines action boundaries, and that complexity grows faster than most systems do.
Read Article
Compliance frameworks improve auditability and baseline control discipline, but they do not guarantee resilient security behavior in live systems.
Read Article
Security architecture can be modeled as a trust graph of principals, resources, and delegated permissions. Incidents often follow graph paths teams never mapped.
Read Article
The future of coding is not human versus AI. It is a systems design problem: assigning cognitive labor to humans and machines with explicit accountability boundaries.
Read Article
A practical guide to coding agents and copilots, including OpenClaw, Codex, and Claude Code: where they deliver leverage, where they fail, and how to integrate them safely.
Read Article
Modern security architecture uses identity as the core trust primitive across users, devices, workloads, and services.
Read Article
When diffusion models keep returning the same composition after prompt edits, they are usually not repeating an image. They are converging toward the same high-probability basin in latent space.
Read Article
Network segmentation cannot secure modern microservices by itself. Service-to-service trust needs explicit identity, mTLS, and policy-aware authorization.
Read Article
The critical quantum security risk starts before practical quantum computers arrive, because long-lived encrypted data is being collected now while global cryptographic migration remains slow and operationally complex.
Read Article