W8MEJ

@w8mej
19 Followers
108 Following
5 Posts
Security engineer & distributed systems nerd focused on AI, cloud, and zero-trust architectures. I care about verifiable training, confidential computing, and making “secure by default” actually real. I write, tinker, and ship odd little projects that live somewhere between research and production. When I’m not building and breaking, I’m probably alpineering, swimming, or on the airwaves.
Crypto Identitieshttps://keyoxide.org/[email protected]nja
Thoughts Signed but Not Yet Verifiedhttps://securesql.info
Githubhttps://github.com/w8mej
🦎 Infrastructure isn't a machine to be fixed; it's an organism that needs to maintain its shape.
In Episode 2, we discuss Autonomous Continuity: using cryptographically signed "Pattern Memory" to shrink RTOs from hours to minutes. We also cover the risks of agentic Reward Hacking and why you need the Petrov Rule for oversight.
🎧 https://open.spotify.com/episode/7bBRpPXMeuCnJrm69aMDAr?si=KQFS6S0FTa-Yu3vGtpLlRQ
#CyberSecurity #BlueTeam #SRE #AI
Target Morphology – Policy-as-Code as System Health

Zero Noise Collective · Episode

Spotify
🦎 What if your network could heal like a living organism?
Traditional DR is reactive. Autonomous Continuity is the next leap. In Episode 2, we discuss Target Morphology (Policy-as-Code) and the TOTE loop (Test, Operate, Exit) to shrink RTOs from hours to minutes.
It’s time to move from "firefighting" to "resilience engineering." Build systems that want to be secure.
🎧 Listen: https://open.spotify.com/episode/7bBRpPXMeuCnJrm69aMDAr?si=KQFS6S0FTa-Yu3vGtpLlRQ
#CyberSecurity #AgenticAI #Resilience #DevSecOps #InfoSec #SecurityEngineering
Target Morphology – Policy-as-Code as System Health

Zero Noise Collective · Episode

Spotify
What if your network wanted to be secure? 🧵 In Episode 1 of "The Morphogenetic SOC," we’re using Michael Levin’s TAME framework to redefine cyber defense. How do you control a system? Level 1: Rewire hardware. Level 2: Modify setpoints. Level 3: Reward behavior. Level 4: Persuade with reasons. Which level is your WAF? #CyberSecurity #AI #zeroknowledge #multiplepartycompute #TAME #evolutionaryalgorithms #agentic #SOC #securityengineering https://open.spotify.com/episode/4Pamgs6PUITRSHUUSFBRu7?si=-nEhwCSoSamkJPtHNe4IiQ&nd=1&dlsi=b9a7fc3ef2914a8f
The End of the Machine Metaphor in Cybersecurity

Zero Noise Collective · Episode

Spotify
Mountains hold ancient secrets. Glaciers move slowly. They remind us about patience. Sometimes, patience means millions of years. Imagine waiting that long for a move. Mountains do not complain. Glaciers keep flowing.

Your analytics data needs verifiable provenance. Untrusted pipelines corrupt insights.
Demand a clear audit trail.

Key tools for trust:
* GhostTelemetry offers transparent data collection.
* AWS Nitro Enclaves secure processing environments.
* OCI SEV-SNP provides hardware-level data protection.
* YubiKey signing enfocement
* Merkle audit ledgers confirm tamper-proof histories.

You must know where your data runs. You deserve verifiable assurance.

https://github.com/w8mej/GhostTelemetry