oci2bin: Docker Images as Single Executables

Overview oci2bin converts any Docker (OCI) container image into a single, self-contained executable. It doesn’t require any Docker daemon, no container runtime, and no installation on the target machine as the binary is static. Just copy the file over and run it. ...

March 11, 2026 · map[name:latedeployment]

makethlm - LLM builder

A small tool I built is makethlm, a command-line task runner in the tradition of Make and Just, but where the task body is natural language executed by an LLM. ...

February 13, 2026 · map[name:latedeployment]

restrict C keyword for optimizations

The restrict keyword in C is a forgotten keyword, with only auto and register more bygone. It is used as a compiler hint, to tell it that pointers does not write on each other, otherwise (without it) when multiple pointers are used in a function and some data is written, it has to reload the pointer each time because it cannot gurantee the pointer itself, or the data it points to was not modified. ...

February 13, 2026 · map[name:latedeployment]

Encrypting and Chunking Data in RSA Public Keys

This is part two of the RSA Public Key Manipulation series. See also Part 1: How to Hide Data Inside RSA Public Keys ...

January 29, 2026 · map[name:latedeployment]

How to Hide Data Inside RSA Public Keys

This is part one of the RSA Public Key Manipulation series. See also Part 2: Encrypting and Chunking Data in RSA Keys ...

January 29, 2026 · map[name:latedeployment]

SBOM as Messaging System

This is part four of the Certificate Transparency series. See also previous parts: Part 1: Certificate Transparency 101 Part 2: Certificate Transparency Info Leaks Part 3: Certificate Transparency as Communication Channel Introduction Described here is a way to leverage the infrastructure used to store SBOM (Software Bill of Materials) certificates in order to distribute messages via the sigstore database. ...

January 28, 2026 · map[name:latedeployment]

Certificate Transparency as Communication Channel

This is part three of the Certificate Transparency series. Introduction Described here is a way to leverage the infrastructure used to validate certificates in order to distribute messages through the Certificate Transparency Logs. ...

January 25, 2026 · map[name:latedeployment]

Certificate Transparency Info Leaks

This is part two of the Certificate Transparency series. Crtificate Transparency logs are leaking valuable information about companies due to either unfamiliarity or obliviousness from companies’ IT or DevOps teams. ...

January 19, 2026 · map[name:latedeployment]

Certificate Transparency 101

This is part one of the Certificate Transparency series. Certificate Transparency (CT) is a public, append-only logging system for TLS certificates. It was created to make certificate issuance observable so that mis-issuance can be detected quickly and independently. Instead of relying only on trust, CT lets anyone audit which certificates were issued for a domain and when they appeared in a public log. ...

January 19, 2026 · map[name:latedeployment]

6 Things to Do With Docker

1. Operate on root files without sudo password We all know that docker access is basically root access, but examples are critical to understanding. ...

March 12, 2024 · map[name:latedeployment]