W8MEJ

@w8mej
21 Followers
108 Following
6 Posts
Security engineer & distributed systems nerd focused on AI, cloud, and zero-trust architectures. I care about verifiable training, confidential computing, and making “secure by default” actually real. I write, tinker, and ship odd little projects that live somewhere between research and production. When I’m not building and breaking, I’m probably alpineering, swimming, or on the airwaves.
Crypto Identitieshttps://keyoxide.org/[email protected]nja
Thoughts Signed but Not Yet Verifiedhttps://securesql.info
Githubhttps://github.com/w8mej

Your SOC is drowning in alerts. Your team is 15 people. They're spread across six continents and responding from satellites.

They aren't failing because they stopped using LLMs for threat modeling.

Energy-Based Models responds as energy landscapes—not the next text string. Governed by TAME principles: Tested, Auditable, Measurable, Explainable. Court-admissible evidence in 47 seconds.

Watch it live: https://securesql.info/2026/05/01/infosecblueprints/

#SecurityOps #IncidentResponse #CyberSecurityAI #SentinelMesh

🦎 Infrastructure isn't a machine to be fixed; it's an organism that needs to maintain its shape.
In Episode 2, we discuss Autonomous Continuity: using cryptographically signed "Pattern Memory" to shrink RTOs from hours to minutes. We also cover the risks of agentic Reward Hacking and why you need the Petrov Rule for oversight.
🎧 https://open.spotify.com/episode/7bBRpPXMeuCnJrm69aMDAr?si=KQFS6S0FTa-Yu3vGtpLlRQ
#CyberSecurity #BlueTeam #SRE #AI
Target Morphology – Policy-as-Code as System Health

Zero Noise Collective · Episode

Spotify
🦎 What if your network could heal like a living organism?
Traditional DR is reactive. Autonomous Continuity is the next leap. In Episode 2, we discuss Target Morphology (Policy-as-Code) and the TOTE loop (Test, Operate, Exit) to shrink RTOs from hours to minutes.
It’s time to move from "firefighting" to "resilience engineering." Build systems that want to be secure.
🎧 Listen: https://open.spotify.com/episode/7bBRpPXMeuCnJrm69aMDAr?si=KQFS6S0FTa-Yu3vGtpLlRQ
#CyberSecurity #AgenticAI #Resilience #DevSecOps #InfoSec #SecurityEngineering
Target Morphology – Policy-as-Code as System Health

Zero Noise Collective · Episode

Spotify
What if your network wanted to be secure? 🧵 In Episode 1 of "The Morphogenetic SOC," we’re using Michael Levin’s TAME framework to redefine cyber defense. How do you control a system? Level 1: Rewire hardware. Level 2: Modify setpoints. Level 3: Reward behavior. Level 4: Persuade with reasons. Which level is your WAF? #CyberSecurity #AI #zeroknowledge #multiplepartycompute #TAME #evolutionaryalgorithms #agentic #SOC #securityengineering https://open.spotify.com/episode/4Pamgs6PUITRSHUUSFBRu7?si=-nEhwCSoSamkJPtHNe4IiQ&nd=1&dlsi=b9a7fc3ef2914a8f
The End of the Machine Metaphor in Cybersecurity

Zero Noise Collective · Episode

Spotify
Mountains hold ancient secrets. Glaciers move slowly. They remind us about patience. Sometimes, patience means millions of years. Imagine waiting that long for a move. Mountains do not complain. Glaciers keep flowing.

Your analytics data needs verifiable provenance. Untrusted pipelines corrupt insights.
Demand a clear audit trail.

Key tools for trust:
* GhostTelemetry offers transparent data collection.
* AWS Nitro Enclaves secure processing environments.
* OCI SEV-SNP provides hardware-level data protection.
* YubiKey signing enfocement
* Merkle audit ledgers confirm tamper-proof histories.

You must know where your data runs. You deserve verifiable assurance.

https://github.com/w8mej/GhostTelemetry