Over the past years I’ve designed and implemented automated build pipelines for deployments, streamlined business reporting processes, and implemented backup and restore automation systems.
Isso. Which fits within my model of controlling who has access to said data.
For personal projects I try and avoid the big cloud hosts, and use the “little guys”, or third parties with good privacy ideals, (tor friendly for example).
This blog is using Jekyll, soon to be hosted using:
- Traefik (Frontend Proxy)
- Docker (Jekyll Files)
- Isso (via Docker)
- Tor Onion (via Docker)
- Acme.sh (Lets Encrypt Certificates)
While in my profession life I control our AWS infrastructure as well as our Azure infrastructure at $dayjob. Respond to customer requests for security audits, as well as support of employees for our ASX backed company.