Updated on Jan 23, 2026Go GC Deep Dive: How It Works and How to Tune ItA production-focused deep dive into Go GC: how the collector works, what STW really means, and how to tune GOGC, heap growth, and memory limits.
Updated on Jan 23, 2026Go Performance Tuning with pprof: CPU, Memory, GCA practical Go performance tuning guide: use pprof to find bottlenecks, reduce allocations, tune GC, and fix lock contention.
Updated on Jan 23, 2026Crawling with the Tor Protocol (Part 5)Part 5 outlines a Tor-based crawling architecture with code-level flow, proxy failover logic, and operational guidance.
Updated on Jan 23, 2026Why Tor + P2P/Torrent Is Risky (Part 4)Part 4 explains why Tor and BitTorrent are a risky combination: UDP discovery, metadata leaks, and high-volume flows make correlation and deanonymization far easier.
Updated on Jan 23, 2026Kubernetes Internals (Part 3): How a Pod Actually RunsA practical, internal view of a Pod: from scheduling and sandbox creation to networking, probes, and termination.
Updated on Jan 23, 2026Kubernetes Internals (Part 2): Linux Control PrimitivesA Linux-first view of how Kubernetes enforces isolation and resource limits, with concrete YAML mapping, kernel primitives, and debug steps.
Updated on Jan 23, 2026Kubernetes Internals (Part 1): What Kubernetes IsA clear, internal-first introduction to Kubernetes: why it exists, the control plane/data plane split, and the core objects that define desired state.
Updated on Feb 13, 2026How the Tor Protocol Works (Part 1)Part 1 explains how Tor circuits, relay roles, onion routing work, plus the threat model and tradeoffs. It sets up the series path toward crawling through Tor.
Updated on Jan 23, 2026How to Use Tor Safely (Part 3)Part 3 explains safe Tor usage, common leaks, and the tools that preserve isolation, from Tor Browser to Tails and Whonix.
Updated on Feb 13, 2026Is Tor + VPN Safe? Part 2: Threat ModelPart 2 compares Tor-only, Tor over VPN, and VPN over Tor, explaining what each observer sees and which setup fits which threat model.
Updated on Jan 23, 2026Mastering Go Concurrency: GMP and Real PatternsA combined guide to Go concurrency: the GMP scheduler model, preemption/blocking behavior, channel synchronization, and three production-ready patterns (hedging, worker pools, pipelines).
Updated on Jan 23, 2026Kubernetes Internals (Part 5): CNI NetworkingA technical walkthrough of CNI: lifecycle, plugin chains, IPAM, and troubleshooting.
Updated on Jan 23, 2026Kubernetes Internals (Part 4): Service NetworkingA practical guide to Kubernetes Service networking: ClusterIP routing, kube-proxy modes, and eBPF data paths.
Updated on Jan 23, 2026Cybersecurity Lab Part 3: Advanced pfSenseAdvanced pfSense hardening and segmentation for a cybersecurity lab: policy routing, IDS/IPS, DNS controls, QoS, and SIEM logging.
Updated on Jan 23, 2026gov-pass: Split-Only TLS ClientHello ArchitectureA deep technical dive into gov-pass: WinDivert and NFQUEUE internals, reassembly complexity, split/inject mechanics, Go implementation notes, and PCAP-based validation.
Updated on Jan 23, 2026K8s Ops with Minecraft Part 3: Proxy PolicyPart 3 documents the proxy policy DSL, routing order, control-plane APIs, and audit architecture.