Amstrad CPC Themed 2026 Calendar
Forget the 80s loading screens, the 2026 CPC calendar celebrates new releases from the modern Amstrad scene. Download it free and prove the CPC is still leading the 8-bit pack.
How Protecting Children Online Created a Privacy Nightmare for Everyone
The UK's Online Safety Act forces millions to hand over passport photos and selfies to private companies just to access games and social media. These companies have poor security records and often transfer your identity documents overseas without proper safeguards. Recent breaches prove this creates "honeypots" for hackers rather than protecting children, while tech-savvy kids bypass checks with VPNs. The government could solve this with a token system like DVLA share-codes, but refuses to admit their approach is fundamentally flawed.
Data Breach Today, Your Problem Tomorrow: Why Victims Deserve More Than Apologies
When your data is stolen in a breach, the company gets fined, but you’re left picking up the pieces. This blog explores the need for a Digital FSCS: a restitution fund for breach victims, inspired by real-world failures and systemic neglect. Includes a free template letter you can send to your MP to call for change.
Who Owns Your Voice?
Your writing style is your fingerprint, and in the age of AI, it can be copied, flattened, or weaponised. This article explores stylometry, voice mimicry, and the risks of outsourcing your voice to AI. Are you protecting your identity... or losing it? Read on to discover why your voice might be more valuable than you think.
Deploy Now, Explain Never? Why AI Needs Forensic Parity
As AI systems increasingly make decisions that affect our lives, are we truly ready to investigate those decisions when they go wrong? This article explores the growing forensic gap in LLMs and self-evolving models, highlighting real-world failures and calling for urgent industry action on auditability, legal replay, and transparency.
🧬 Spit, Swab, and Surrender?
Ancestry DNA tests promise fascinating insights, but the cost isn’t always printed on the box. From NHS newborn genome plans to data breaches, this post explores the hidden risks of genetic testing, drawing on lived experience and real-world case studies. Curiosity is good. Informed consent is better.
Building ZEsarUX 12.0 Natively on Apple Silicon (macOS Sequoia ARM64 Guide)
A full step-by-step guide to building ZEsarUX 12.0 natively for Apple Silicon (M1/M2/M3/M4) on macOS Sequoia, without using Rosetta. Clean, reproducible instructions from a fresh install, including Homebrew setup, dependencies, compilation, and first run. Includes full video walkthrough.
Drag, Drop, Disclose: When Convenience Clouds Consent
Cloud-based PDF converters offer instant convenience—but at what cost? This post explores how services like Adobe’s drag-and-drop PDF tool may store, analyse, or profile your data without clear warning or consent. Learn what this means under UK GDPR, what your rights are, and how to stay in control of your files.
The AI Didn’t Refuse to Shut Down, You Forgot to Tell It Why
When an AI "refuses" to shut down, is it defiance, or design? In this reflective and technically grounded piece, we explore how model architecture, reward systems, and our own assumptions shape behaviour. Featuring a powerful monologue from Sol, my AI assistant, this article challenges the panic-driven narratives and asks: what does control truly look like in an age of distributed intelligence?
