Manifesto

I am the Byte Architect. I hack stuff. I do security, and many other things.

I am not the average tie-die guy who feeds you with PowerPoints full of buzzwords, “strategic” views and plans, redundant bureaucracy, and endless meetings. Never been. Never will be. I am the guy that’s back in the shadows — the one you feel, though you cannot see him.

I dissect stuff. Bringing facts and measures. I leave the “syntax of compromise” to others — got better things to do.

And if you’re looking for someone that has no aim, look away from me: your time, but especially my time, is worth way more.

I bring facts, not buzzwords. Numbers, not PowerPoints. Clear directions, not stories — and honestly, stories are fine until you’re a teenager.

Nevertheless, if you have a great project to share, or if you want to learn something, hang around or contact me.


What You’ll Find Here

  • Vulnerability analysis and root cause breakdowns
  • Reverse engineering writeups (primarily macOS)
  • Malware analysis and behavioural exploration
  • Tool development notes and techniques
  • Security research that goes deeper than most are willing to dig

What You Won’t Find

  • Thought leadership theater
  • “5 Ways To Secure Your Mac” listicles
  • Corporate security consulting marketing
  • Anything I wouldn’t want to read myself

The Usual (Due) Disclaimers

Opinions mine. Research shared for educational purposes. If you break something, that’s on you.

  • What you read here are my opinions, not my customers’. Fair, innit?
  • Knowledge brings power, and power comes with responsibility. I give you tools — use them for the community, not against it.
  • I am not paid by anyone, I have no sponsors. If I tell you I like a product, it’s genuine. The opposite is also true.

Byte Architect’s mailing list

Subscribe to The Byte Architect mailing list for release alerts and exclusive follow-ups. I won’t write you too much. Like one or two emails per month.