QuickMailZone
LiveSelf-hosted temporary email solution for privacy-conscious users
- Self-Hosted
- Privacy
Open-source tools focused on performance, privacy, and self-sovereignty. All projects prioritize user control and data ownership.
Self-hosted temporary email solution for privacy-conscious users
High-performance Rust application for unified cryptocurrency address sharing
Accurate open-source pre-1986 RBMK-1000 nuclear reactor simulation written in Rust
Self-hostable, highly configurable cryptocurrency payment processor
End-to-end encrypted forms platform. Privacy-first alternative to existing solutions
Agentic web search with any OpenAI-compatible LLM. Recursive search with multi-engine support
High-performance SEC-DED encoding implementation
Building systems where performance, privacy, and reliability are non-negotiable.
Built KryptoLink for unified crypto address sharing and RBMK-rs for nuclear reactor simulation—projects where correctness is non-negotiable and performance is measured in nanoseconds. Preferred low-level language for new projects where control over memory and concurrency is essential.
Full-stack applications where the boundary between frontend and backend blurs as well as pure frontend projects.
Rapid prototyping, AI, and automation. Scripts that orchestrate other tools, data processing pipelines, ML integration points—Python handles the glue work that doesn't need the overhead of a compiled language. The ecosystem is mature enough to pull in battle-tested libraries for almost anything.
Every bit matters. Cache-aware data structures, careful memory layout, compiler intrinsics. Profiling under load, measuring actual throughput, and making targeted improvements rather than premature optimization.
VaultForms uses end-to-end encryption where the server never sees plaintext. X-CryptoPay processes real transactions that require correct cryptographic implementation. The work involves implementing cryptographic primitives correctly. Constant-time operations, proper randomness sources, secure key handling. Auditing code for side-channel vulnerabilities and understanding why certain implementations are fragile.
QuickMailZone lets users communicate without leaving a trace. VaultForms encrypts form data so even database compromises don't expose submissions. The approach: assume breach, minimize blast radius, collect nothing that isn't strictly necessary. Privacy by architecture means the system is private even when functioning correctly, data never touches the server unencrypted unless it has to.
auto-search distributes work across multiple search engines with recursive traversal. X-CryptoPay handles payment state across potentially unreliable network conditions. Event sourcing provides audit trails; consensus protocols ensure consistency without single points of failure.
AI accelerates the mechanical parts of development, generating boilerplate, scaffolding tests, exploring unfamiliar codebases. The key distinction: AI handles execution; humans handle intent. My value involves knowing when AI output is trustworthy and when it needs verification. AI doesn't understand the process knowledge, the human does.
Effectiveness depends on how prompts and requests are transformed and injected into context windows. The work involves structuring prompts that account for edge cases, security implications, and model limitations. Good prompts reduce hallucination and improve relevance.
Technical debt slows future development. AI identifies patterns, deprecated API usage, inconsistent error handling, abstraction layers that have leaked. The work involves evaluating suggestions critically rather than accepting them. Refactoring is risky; AI makes it faster but doesn't make it safer. The human judgment: does this change actually improve the code?
Every AI-assisted project still needs rigorous verification. Generated code may have security flaws, performance issues, or subtle logical errors.
All production services can run on owned hardware. No vendor deprecations breaking live systems, no pricing changes mid-project. QuickMailZone, KryptoLink, and VaultForms all deploy on infrastructure with full visibility into resource usage and security posture. Self-hosting means understanding the entire stack.
Docker multi-stage builds keep binaries lean. Every project containerizes development, CI, and production environments identically. Reproducible builds mean fewer 'works on my machine' incidents. Kubernetes provides orchestration for scaling and self-healing.
PostgreSQL, Redis, SQLite.
Production systems run Linux. Kernel tuning, network namespace configuration, systemd unit management, firewall rules. Hardening servers against network scanning and intrusion attempts. The ability to diagnose issues at the system call level.