T34ch Tech
Technology & Security Education

T34ch
Tech

Writing and courses at the intersection of technology, security, and the craft of building systems that last.

Drawn from practice. Written to be useful.

20+
Years in practice
142
Published articles
05
Courses
08
Active projects
Featured Series
COLDBOOT
25-Part Series · From Power Button to Shell Prompt
How a computer actually starts. Every step, from voltage on a wire to a running shell. No prerequisites assumed.
Start Reading →
Articles
01 //

Articles

01
Dwell Time as a Security Metric: What It Tells You and What It Hides
Most response programs treat mean time to detect as a success metric. It is not — it is a lagging indicator dressed up as a KPI.
02
Using Language Models for Threat Intelligence Triage at Scale
Zero-shot classification against MITRE ATT&CK without a training corpus. What works, what does not, and where the technique breaks down.
03
SPAKE2 in Practice: Key Exchange for Low-Trust Peer Channels
A working implementation walkthrough with notes on entropy sourcing, nonce discipline, and where PAKE fits in a broader authentication architecture.
04
GeoDNS Without the Drama: Lessons from a Four-Node Mesh
Why we replaced LUA-based GeoDNS records with plain round-robin and a BGP overlay, and what we learned about operational complexity along the way.
05
mTLS + WebAuthn + DPoP: A Layered Authentication Stack
Three complementary protocols and why none of them are sufficient alone. A design walkthrough from first principles to production.
06
Physical Identifier Standards: GS1, ISO 15459, VIN, and the Gaps Between Them
What every long-lived object tracking system can learn from automotive and logistics. A survey of what works and where the seams show.
07
Sound as Cognitive Signal: Designing Alert Vocabularies for Security Operations
Additive synthesis, FM synthesis, and the psychoacoustics of urgency. How to build an auditory icon system that actually communicates severity.
08
One-Time Pad Key Material: Substrate Selection Under Constraint
Nitrocellulose, silk, and mulberry paper. Physical key material for hand ciphers under adversarial threat models, from entropy sourcing to destruction.
Courses
02 //

Courses

Foundational · All Levels

Cold Boot

From power button to shell prompt. A 25-article series explaining how a computer actually starts -- voltage, firmware, bootloaders, kernel, filesystem, and shell. Every step, no prerequisites assumed.

Hardware Firmware Boot Kernel Filesystem Shell
Duration10 hrs
FormatSelf-Paced
Articles25
LevelBeginner
Foundational · All Levels

Incident Response Operations

From alert to after-action report. Covers triage methodology, evidence preservation, containment decision trees, and structured communication under pressure. Grounded in 20 years of hands-on response work across enterprise environments.

Triage Evidence Handling Containment After-Action Communication
Duration8 hrs
FormatSelf-Paced
Modules12
LevelAll
Intermediate · Engineering

Cryptographic Systems in Practice

SPAKE2, HKDF, ChaCha20-Poly1305, Ed25519, BLAKE3 — not as theory, but as working components. Build authenticated channels, content-addressed stores, and signed data structures from scratch in Rust.

SPAKE2 HKDF Ed25519 BLAKE3 Rust
Duration12 hrs
FormatProject-Based
Modules16
LevelIntermediate
Advanced · Engineering + Ops

Threat Hunting with ML and NLP

Apply language models, TensorFlow, and zero-shot classifiers to security telemetry. Build pipelines that surface behavioral anomalies without signature dependency. Real datasets, real tooling, real adversarial conditions.

NLP TensorFlow ATT&CK Mapping Anomaly Detection SIEM
Duration16 hrs
FormatLab-Intensive
Modules20
LevelAdvanced
Practitioner · Security Leaders

Building Security Programs That Last

Not frameworks — outcomes. Covers metrics that matter, stakeholder communication, hiring and retaining analysts, and the organizational patterns that separate durable programs from ones that collapse under pressure.

Program Design Metrics Hiring Stakeholders Resilience
Duration6 hrs
FormatWorkshop
Modules8
LevelLeadership