About
Manifesto
I am the Byte Architect. I hack stuff. I do security, and many other things.
I am not the average tie-die guy who feeds you with PowerPoints full of buzzwords, “strategic” views and plans, redundant bureaucracy, and endless meetings. Never been. Never will be. I am the guy that’s back in the shadows — the one you feel, though you cannot see him.
I dissect stuff. Bringing facts and measures. I leave the “syntax of compromise” to others — got better things to do.
And if you’re looking for someone that has no aim, look away from me: your time, but especially my time, is worth way more.
I bring facts, not buzzwords. Numbers, not PowerPoints. Clear directions, not stories — and honestly, stories are fine until you’re a teenager.
Nevertheless, if you have a great project to share, or if you want to learn something, hang around or contact me.
What You’ll Find Here
- Vulnerability analysis and root cause breakdowns
- Reverse engineering writeups (primarily macOS)
- Malware analysis and behavioural exploration
- Tool development notes and techniques
- Security research that goes deeper than most are willing to dig
What You Won’t Find
- Thought leadership theater
- “5 Ways To Secure Your Mac” listicles
- Corporate security consulting marketing
- Anything I wouldn’t want to read myself
The Usual (Due) Disclaimers
Opinions mine. Research shared for educational purposes. If you break something, that’s on you.
- What you read here are my opinions, not my customers’. Fair, innit?
- Knowledge brings power, and power comes with responsibility. I give you tools — use them for the community, not against it.
- I am not paid by anyone, I have no sponsors. If I tell you I like a product, it’s genuine. The opposite is also true.
Byte Architect’s mailing list
Subscribe to The Byte Architect mailing list for release alerts and exclusive follow-ups. I won’t write you too much. Like one or two emails per month.