Who Am I
Identity
I operate under the handle algiooo. This site acts as a quiet corner of the web where I collect thoughts, notes, and experiments. It is intentionally simple. No feeds, no algorithms, no branding strategy. Just a space to document ideas and technical curiosity over time.
The goal is not to present a polished persona or a résumé. Instead, this page serves as a stable point of identity on the internet, separate from platforms that constantly reshape how information is presented. What appears here reflects things I am learning, testing, or thinking about.
Interests
Much of my curiosity revolves around systems and the ways they break. Security is rarely about dramatic exploits. More often it is about small misunderstandings between components, assumptions in configuration, or layers of software interpreting the same input differently.
I enjoy digging into the details behind those behaviors. That can mean exploring kernel parameters, examining container isolation, analyzing phishing infrastructure, or experimenting with authentication mechanisms like JWTs. The common thread is understanding how systems behave rather than treating them as opaque tools.
Focus areas
- Defensive security and detection engineering
- Linux and container hardening
- Studying attacker tooling in order to better defend systems
- Privacy-respecting practices and minimal system design
Current curiosity
Recently I have been spending time building small lab environments to test ideas safely. These labs make it easier to experiment with detection logic, observe how software behaves under unusual conditions, and document findings in a structured way.
I am also interested in improving how technical notes are written and organized. Clear documentation makes experiments repeatable and turns scattered observations into something that may be useful to others.
Philosophy
Security work often attracts exaggerated narratives. I have little interest in that. The reality is quieter: careful observation, small experiments, and incremental learning.
I value curiosity, skepticism, and understanding how tools actually behave beneath their documentation. Sharing that process openly, while remaining mindful of operational security, is part of why this site exists.
Think of it as a long-term notebook rather than a portfolio.