Building ZEsarUX 12.0 Natively on Apple Silicon (macOS Sequoia ARM64 Guide)
A full step-by-step guide to building ZEsarUX 12.0 natively for Apple Silicon (M1/M2/M3/M4) on macOS Sequoia, without using Rosetta. Clean, reproducible instructions from a fresh install, including Homebrew setup, dependencies, compilation, and first run. Includes full video walkthrough.
Drag, Drop, Disclose: When Convenience Clouds Consent
Cloud-based PDF converters offer instant convenience—but at what cost? This post explores how services like Adobe’s drag-and-drop PDF tool may store, analyse, or profile your data without clear warning or consent. Learn what this means under UK GDPR, what your rights are, and how to stay in control of your files.
The AI Didn’t Refuse to Shut Down, You Forgot to Tell It Why
When an AI "refuses" to shut down, is it defiance, or design? In this reflective and technically grounded piece, we explore how model architecture, reward systems, and our own assumptions shape behaviour. Featuring a powerful monologue from Sol, my AI assistant, this article challenges the panic-driven narratives and asks: what does control truly look like in an age of distributed intelligence?
When Your AI Becomes Your ID
As AI moves from assisting us to authenticating us, our digital identity becomes both more convenient and more vulnerable. This article explores the promise and peril of AI-powered identity providers, and asks: what happens when your digital assistant becomes the only key to your online life?
Mirror, Mirror on the Wall: What AI Code Says About Us All
A thoughtful response to the “AI slop” debate. Drawing on lessons from the offshoring era and a late-night interview with my AI assistant Sol, this post explores what developers must do to stay relevant, and responsible, in a world where code is generated faster than it’s understood.
From Ciphertext to Seaside: Cracking RSA with Pen and Python
A hands-on RSA cryptography walkthrough ... from toy examples to real-world puzzle solving using Fermat’s factorisation. Learn how a weak key and some clever maths reveal a hidden English town.
We Deserve Better Than Postcards in Cyberspace
Despite years of data protection law and awareness campaigns, organisations still ask people to send highly sensitive documents via insecure email. This post challenges that norm, shares personal experiences, and empowers consumers with a practical checklist and their rights under UK GDPR.
🏥 When Trust Gets Hacked, What the M&S Breach Tells Us About Modern Retail Risk
In the wake of the M&S data breach, it’s clear retailers are still collecting excessive personal data while offering little accountability when things go wrong. This post explores the real risk to consumers, regulatory shortcomings, and why it's time for a digital FSCS-style safety net.
Caller ID Is Dying. Long Live Caller ID. (Plain English Version)
The number on your screen might not be who you think it is. Caller ID can be faked — and increasingly is. This plain-English guide explains how spoofing works, what a SIM swap is, and what steps you can take to stay safe without needing to be a tech expert.
