My Substack Article citations

86 bookmarks
Newest
Elon Musk's US Department of Defense contracts
Elon Musk's US Department of Defense contracts
Elon Musk's companies have a variety of contracts with the U.S. Department of Defense, highlighting the growing relationship between the tech entrepreneur's ventures and the U.S. military. The contracts include:
·reuters.com·
Elon Musk's US Department of Defense contracts
Pentagon to start using Grok as part of a $200 million contract with Elon Musk's xAI
Pentagon to start using Grok as part of a $200 million contract with Elon Musk's xAI
The announcement comes just days after Grok generated antisemitic responses and praised Hitler, which were later deleted.
y federal agencies, local governments, and national security operations.
xAI has continued to expand its government work. The new offering includes custom national security tools, AI-powered science and health applications, and cleared engineering support for classified environments.
·cbsnews.com·
Pentagon to start using Grok as part of a $200 million contract with Elon Musk's xAI
DOGE Track
DOGE Track
An automatically-generated and frequently updated site for presenting data on DOGE’s rampage across government, designed to work on large screens and mobile phones.
·dogetrack.info·
DOGE Track
OSINT researcher discovered Coristine's Packetware has less than 10 paying customers, nowhere near enough to justify 40+ Terabytes of data leaving his network in February, 2025 at the height of DOGE activity https://go.screenpal.com/watch/cTQ1nlnoYyr
OSINT researcher discovered Coristine's Packetware has less than 10 paying customers, nowhere near enough to justify 40+ Terabytes of data leaving his network in February, 2025 at the height of DOGE activity https://go.screenpal.com/watch/cTQ1nlnoYyr
packetware left their customer database online with no password, proving they are a shell company with less than 10 paying customers.
·go.screenpal.com·
OSINT researcher discovered Coristine's Packetware has less than 10 paying customers, nowhere near enough to justify 40+ Terabytes of data leaving his network in February, 2025 at the height of DOGE activity https://go.screenpal.com/watch/cTQ1nlnoYyr
DOGE Is Just Getting Warmed Up
DOGE Is Just Getting Warmed Up
DOGE has tapped into some of the most sensitive and valuable data in the world. Now it’s starting to put it to work.
·wired.com·
DOGE Is Just Getting Warmed Up
Kubernetes API health endpoints healthz, livez, readyz
Kubernetes API health endpoints healthz, livez, readyz
The Kubernetes API server provides API endpoints to indicate the current status of the API server. This page describes these API endpoints and explains how you can use them. API endpoints for health The Kubernetes API server provides 3 API endpoints (healthz, livez and readyz) to indicate the current status of the API server. The healthz endpoint is deprecated (since Kubernetes v1.16), and you should use the more specific livez and readyz endpoints instead.
·kubernetes.io·
Kubernetes API health endpoints healthz, livez, readyz
Kubernetes API Concepts
Kubernetes API Concepts
The Kubernetes API is a resource-based (RESTful) programmatic interface provided via HTTP. It supports retrieving, creating, updating, and deleting primary resources via the standard HTTP verbs (POST, PUT, PATCH, DELETE, GET). For some resources, the API includes additional subresources that allow fine-grained authorization (such as separate views for Pod details and log retrievals), and can accept and serve those resources in different representations for convenience or efficiency. Kubernetes supports efficient change notifications on resources via watches: in the Kubernetes API, watch is a verb that is used to track changes to an object in Kubernetes as a stream.
·kubernetes.io·
Kubernetes API Concepts
Egress Gateway cilium important!!!
Egress Gateway cilium important!!!
Enhancing network security and traffic control exiting Kubernetes environments
Egress gateways provide a way to route all outbound traffic from certain pods through a specific node with a predictable IP address. This predictable IP can be useful for scenarios where the traffic destination requires a known source IP, for instance, when working with legacy systems or firewall rules.
·cilium.io·
Egress Gateway cilium important!!!
Key-Value Store — Cilium 1.19.0-dev documentation
Key-Value Store — Cilium 1.19.0-dev documentation
All endpoint IPs and corresponding identities are mirrored to the kvstore by the agent on the node where the endpoint is launched, to allow peer nodes to configure egress policies to endpoints backed by these IPs.
All endpoint IPs and corresponding identities are mirrored to the kvstore by the agent on the node where the endpoint is launched, to allow peer nodes to configure egress policies to endpoints backed by these IPs.
·docs.cilium.io·
Key-Value Store — Cilium 1.19.0-dev documentation
Introduction to Cilium & Hubble — Cilium 1.19.0-dev documentation
Introduction to Cilium & Hubble — Cilium 1.19.0-dev documentation
Because eBPF runs inside the Linux kernel, Cilium security policies can be applied and updated without any changes to the application code or container configuration.
This shift toward highly dynamic microservices presents both a challenge and an opportunity in terms of securing connectivity between microservices. Traditional Linux network security approaches (e.g., iptables) filter on IP address and TCP/UDP ports, but IP addresses frequently churn in dynamic microservices environments.
An additional challenge is the ability to provide accurate visibility as traditional systems are using IP addresses as primary identification vehicle which may have a drastically reduced lifetime of just a few seconds in microservices architectures.
Cilium retains the ability to transparently insert security visibility + enforcement, but does so in a way that is based on service / pod / container identity (in contrast to IP address identification in traditional systems
Overlay networking: encapsulation-based virtual network spanning all hosts with support for VXLAN and Geneve. It works on almost any network infrastructure as the only requirement is IP connectivity between hosts which is typically already given. Native routing mode: Use of the regular routing table of the Linux host. The network is required to be capable of routing the IP addresses of the application containers. It integrates with cloud routers, routing daemons, and IPv6-native infrastructure. Flexible routing options: Cilium can automate route learning and advertisement in common topologies such as using L2 neighbor discovery when nodes share a layer 2 domain, or BGP when routing across layer 3 boundaries.
Cilium Cluster Mesh enables secure, seamless connectivity across multiple Kubernetes clusters.
·docs.cilium.io·
Introduction to Cilium & Hubble — Cilium 1.19.0-dev documentation
Sherlock Holmes on Problem Solving - Sherlock Holmes Quotes
Sherlock Holmes on Problem Solving - Sherlock Holmes Quotes
“When you follow two separate chains of thought, Watson, you will find some point of intersection which should approximate to the truth.” – The Disappearance of Lady Frances Carfax
“Any truth is better than indefinite doubt.” – The Yellow Face
“The world is full of obvious things which nobody by any chance ever observes.” – The Hound of the Baskervilles
“We balance probabilities and choose the most likely. It is the scientific use of the imagination.” – The Hound of the Baskervilles
“It is a capital mistake to theorize before one has data. Insensibly one begins to twist facts to suit theories, instead of theories to suit facts.” – A Scandal in Bohemia
·sherlockholmesquotes.com·
Sherlock Holmes on Problem Solving - Sherlock Holmes Quotes
Favorite phrase/quote? : r/SherlockHolmes
Favorite phrase/quote? : r/SherlockHolmes
Totally agree, I’m a physician in real life and another phrase that keeps coming back to my mind is “There is nothing more deceptive than an obvious fact” how many diagnosis have been missed by that.
·reddit.com·
Favorite phrase/quote? : r/SherlockHolmes
Elon Musk Wants to Get Operational Control of the Treasury’s Payment System. This Could Not Possibly Be More Dangerous
Elon Musk Wants to Get Operational Control of the Treasury’s Payment System. This Could Not Possibly Be More Dangerous
If you are a current or former career “civil service” Treasury or Federal Reserve System employee, including in the general counsel’s offices of either entity, and you have detailed knowledge of how the Bureau of Fiscal Service operates at an operational level please contact me over email or over signal — linked here. This is a free piece of Notes on the Crises. I will not be paywalling any coverage of this crisis for as long as it persists, so please take out a paid subscription to facilitate
I do not think Musk’s stated rationale has any additional credibility because it was repeated by anonymous Treasury officials. It's important to understand that “improper” is in the eye of the beholder, and the danger of operational access to the payments system is precisely that there are very little safeguards for its improper use or manipulation.
·crisesnotes.com·
Elon Musk Wants to Get Operational Control of the Treasury’s Payment System. This Could Not Possibly Be More Dangerous
Day Five of the Trump-Musk Treasury Payments Crisis of 2025: Not “Read Only” access anymore contact this guy?
Day Five of the Trump-Musk Treasury Payments Crisis of 2025: Not “Read Only” access anymore contact this guy?
If you are a current or former career Bureau of the Fiscal Service Employee, especially if you’re a legacy IT programmer with years of experience and especially if you are a COBOL programmer currently working on the PAM, SPS or any other adjacent team, contact me over email or
All thought read only access was extraordinarily dangerous to the country. Unfortunately, my sources also tell me that the subsequent anonymous sources mainstream journalists reported who worked to downplay the situation are not accurate.
Marko Elez, has not only read but write access to BFS servers.
The issue is understanding the specific physical limitations of the system, the way that it interacts with the “Business Logic” of the code and a million other contextual factors.
We are in such a catastrophic situation I do not have the words to describe. It is getting worse and very little is being done. Lawsuits have been launched to stop this on privacy grounds, but we need so much more. Strongly worded letters from congress are not enough.
·crisesnotes.com·
Day Five of the Trump-Musk Treasury Payments Crisis of 2025: Not “Read Only” access anymore contact this guy?
'Go haywire': Onlookers freak out as 25-year-old set loose on Treasury computer system
'Go haywire': Onlookers freak out as 25-year-old set loose on Treasury computer system
A 25-year-old engineer tied to Elon Musk has been given full control over the computer code that directs Social Security payments, tax returns and other payments owed to Americans — and sources inside the Treasury Department are freaking out and don't know where to turn for help.Marko Elez, who prev...
Tankus said he's been hearing from sources inside the agency who feel there's no one left in the federal government to whom they can report security breaches.
In normal times, I would report insider threats to the appropriate security channels inside the government, but there is no one left for me to report it to."
·rawstory.com·
'Go haywire': Onlookers freak out as 25-year-old set loose on Treasury computer system