Filed under
Privacy
10 entries
Python·5 min read·
From Paper to Font File: Building an Open-Source Handwriting Digitizer
How Handwright turns a scanned worksheet into a custom .ttf font — OpenCV glyph extraction, potrace vectorization, and fonttools assembly. Local-first, no cloud required.
Computational Science·32 min read·
Preparing Your Homelab for the Quantum Future: Post-Quantum Cryptography Migration
Implement post-quantum cryptography with CRYSTALS-Kyber and Dilithium—prepare homelab for quantum threats using NIST-approved algorithms.
Ethics·18 min read·
Building a Privacy-First AI Lab: Deploying Local LLMs Without Sacrificing Ethics
Build privacy-first AI lab with local LLMs—run models up to 34B on RTX 3090 (24GB VRAM) with network isolation, traffic monitoring, and real privacy controls.
Cryptography·13 min read·
Self-Hosted Password Manager Migration: Bitwarden Deep Dive
Migrate to self-hosted Bitwarden—deploy secure vault with backup strategies, SSL certificates, and database encryption for full control.
Cryptography·6 min read·
Implementing DNS-over-HTTPS (DoH) for Home Networks
Deploy DNS-over-HTTPS with Pi-hole and dnscrypt-proxy—encrypt DNS queries for home network privacy and prevent ISP monitoring with DoH implementation.
Ai·8 min read·
Local LLM Deployment: Privacy-First Approach
Deploy local LLMs for privacy-first AI—run language models on homelab hardware with model selection, optimization, and deployment strategies.
Ai·4 min read·
Securing Your Personal AI/ML Experiments: A Practical Guide
Secure personal AI experiments with model isolation and network segmentation—protect LLM deployments using privacy controls and threat modeling.
Homelab·13 min read·
Privacy-Preserving AI Training Across My Homelab: Federated Learning with Granular-Ball Computing
Deploy federated learning across homelab with granular-ball computing—train privacy-preserving models with 82% reduced network transfer.
Privacy·9 min read·
Zero-Knowledge Proof Authentication for Homelab Services
Implement privacy-preserving authentication using ZK-SNARKs for homelab SSO. No passwords transmitted, cryptographic proof of identity without revealing credentials.
Cryptography·14 min read·
Demystifying Cryptography: A Beginner's Guide to Encryption, Hashing, and Digital Signatures
Learn cryptography fundamentals with AES-256, RSA, and SHA-3—implement encryption, hashing, and digital signatures for production security systems.