Techiavellian
Technology is power.

Recent Posts

Introducing smoke!

Screenshot of smoke

I’ve found myself unemployed with a bit more free time than usual for the last few months, and I decided that it was the perfect opportunity to learn a bit about LLM tool use and to try out this whole “vibe coding” thing. Inspired in part by one blog post by Thomas Ptacek saying I was nuts not to use LLMs more and another by Thorsten Ball explaining the nuts and bolts of “agents” , I set out to make one with the right ergonomics and features just for me - a CLI application I could run in tmux beside my NeoVim pane while editing code.

Keep reading →

Hello, again

Niccolo Techiavelli

I seem to have a habit of announcing my return to blogging roughly every six years. One might reasonably question whether someone who has to post 3 “hello, world” announcements is truly committed to this whole blogging thing. Maybe it’s a sign that I can’t help myself. That no matter how hard I try, I just can’t quit you, dear reader.

Even though some of my old posts make me cringe, and even though I’ll likely feel the same way about my next batch of posts in a further 6 or 12 years, I still think writing in public is an important exercise. Maybe more important than ever. As I’ve said before :

Keep reading →

Hacking in the Dark, Episode 4: More Interesting Roam Features

In this video, I cover a few more interesting features of Roam Research that I find helpful for my note-taking. I particularly recommend considering attributes for your page metadata templates - I learned the hard way that I should’ve used them from the beginning. You’ll learn how to create attributes, and how you can use them in queries and attribute tables , as well as some new keyboard shortcuts, how I use emojis, and more!

Keep reading →

The Number One Priority: Intellectual denial of service attacks, part 3

Really?

Over the last few years, I’ve seen several instances of (and reactions against) an intellectual denial of service attack that I’ll call “The Number One Priority”. Maybe you’ve seen it, too.

We cannot do anything until someone’s Number One Priority is satisfied. Exploring Mars? What about the starving Earth children? Developing a decentralized alternative to the current global monetary system? Fix this one first! Building a mobile scooter company to facilitate easy travel in big cities? NOT EVERYONE LIVES IN CITIES!

Keep reading →

Hacking in the Dark, Episode 1: The Boring One

I finally bought a camera for my desktop, so I figured I’d give it a spin with OBS Studio. This was mostly a trial run to see how my mic, camera, video quality, etc. were working. In this short video, I give a quick rundown of how I write Go code, and mention some VIM plugins I find useful.

Keep reading →

The Map to Nowhere: Intellectual denial of service attacks, part 2

Internet stickup

In my first post on intellectual denial of service attacks , I covered something I dubbed “bad infinitum,” a tendency for non-experts to overwhelm experts with repetitive, costly, and often unproductive demands for evidence or counter-argument to oft-debunked or misleading claims. Here, I’ll cover another of these intellectual attack vectors, which I’ll call “the map to nowhere.” An asymmetry exists in each of these attacks: easy to launch, hard to counter.

Keep reading →