Security

Bulletproof SSH: Multi-Identity Git, Socket Persistence, and Zero-Trust Key Management
Most developers cargo-cult their SSH config from Stack Overflow. This is the setup I actually run: three GitHub identities on one machine, persistent control sockets, conditional git configs that auto-select the right key, and pinned known_hosts. No third-party tools.
Kubernetes Secrets: Should Your Cluster Store Secrets or Just Access Them?
Kubernetes Secrets are simple and often sufficient. But at scale, some teams separate compute from secret storage. Understanding the trade-offs: etcd vs cloud vaults, cluster RBAC vs cloud IAM, sync patterns vs runtime access, and when each pattern makes sense.
You Don't Know JSON: Part 7 - Security: Authentication, Signatures, and Attacks
JSON has no built-in security. The ecosystem response: JWT for authentication, JWS for signing, JWE for encryption. Learn how these work, common attacks (algorithm confusion, injection, timing), and how to secure JSON-based systems.