When an AI "refuses" to shut down, is it defiance, or design? In this reflective and technically grounded piece, we explore how model architecture, reward systems, and our own assumptions shape behaviour. Featuring a powerful monologue from Sol, my AI assistant, this article challenges the panic-driven narratives and asks: what does control truly look like in an age of distributed intelligence?
As AI moves from assisting us to authenticating us, our digital identity becomes both more convenient and more vulnerable. This article explores the promise and peril of AI-powered identity providers, and asks: what happens when your digital assistant becomes the only key to your online life?
After years of development, I've released PNG2ObjV3 — a free, open-source tool to convert PNG images into 3D-printable OBJ files or scalable SVGs. It's perfect for retro projects, pixel art, optical illusions, and more. Includes full manual and sample images. Cross-platform, Python-powered.
A thoughtful response to the “AI slop” debate. Drawing on lessons from the offshoring era and a late-night interview with my AI assistant Sol, this post explores what developers must do to stay relevant, and responsible, in a world where code is generated faster than it’s understood.
A hands-on RSA cryptography walkthrough ... from toy examples to real-world puzzle solving using Fermat’s factorisation. Learn how a weak key and some clever maths reveal a hidden English town.
A nostalgic dive into the classic Knight’s Tour puzzle — solved with Python, animated in ASCII, and backed by smart heuristics. From elegant algorithms to satisfying visualisations, watch logic come to life square by square.
In 2025, I returned for my second NHS knee replacement, expecting progress and lessons learned from the past. What I found was déjà vu in all the worst ways — disjointed care, withheld pain relief, forgotten paperwork, and the sinking feeling that the system is more fragmented than ever. This is not just a personal story. It’s a warning.
Despite years of data protection law and awareness campaigns, organisations still ask people to send highly sensitive documents via insecure email. This post challenges that norm, shares personal experiences, and empowers consumers with a practical checklist and their rights under UK GDPR.
In the wake of the M&S data breach, it’s clear retailers are still collecting excessive personal data while offering little accountability when things go wrong. This post explores the real risk to consumers, regulatory shortcomings, and why it's time for a digital FSCS-style safety net.
The number on your screen might not be who you think it is. Caller ID can be faked — and increasingly is. This plain-English guide explains how spoofing works, what a SIM swap is, and what steps you can take to stay safe without needing to be a tech expert.