Skip to content
James Moody

James Moody

  • About
  • Contact
  • Posts
  • Privacy Policy
James Moody
James Moody
  • Building a PQC Lab on a Normal Laptop
    Technical

    Building a PQC Lab on a Normal Laptop

    ByJames Moody March 29, 2026

    I’m building a PQC lab on a standard laptop. Four cores, 24GB RAM, already carrying my day-to-day workload. This isn’t a lab environment. It’s the same machine everything else runs on. If something slows down, breaks, or behaves badly, I feel it immediately. That’s intentional. If PQC introduces real operational cost, this is where it…

    Read More Building a PQC Lab on a Normal LaptopContinue

  • Technical Debt Is Deferred Responsibility
    Technical

    Technical Debt Is Deferred Responsibility

    ByJames Moody March 22, 2026

    The Quiet Accumulation Technical debt is often described using financial language, but it behaves more like deferred responsibility. Technical debt accumulates when everyone knows something must be done, but no one owns doing it. It is the responsibility to keep systems patched, within supported lifecycles, and aligned to a defined purpose, while ensuring infrastructure can…

    Read More Technical Debt Is Deferred ResponsibilityContinue

  • Leadership Is What You Do, Not What You’re Called
    Leadership

    Leadership Is What You Do, Not What You’re Called

    ByJames Moody March 15, 2026March 15, 2026

    In many engineering teams, leadership becomes visible long before anyone receives the title. The Waiting Problem Most engineers wait for permission to lead. Most organizations unintentionally teach them to. Ownership is unclear, so everyone hesitates. A process is broken, but no one wants to overstep. A decision stalls because the person with the title is…

    Read More Leadership Is What You Do, Not What You’re CalledContinue

  • Post-Quantum Signatures and the Next Shift in PKI Trust
    Technical

    Post-Quantum Signatures and the Next Shift in PKI Trust

    ByJames Moody March 14, 2026March 15, 2026

    Google published a proposal last month that may signal an interesting direction for the future of internet trust infrastructure. Merkle Tree Certificates. Read the announcement directly before continuing:https://security.googleblog.com/2026/02/cultivating-robust-and-efficient.html To understand why this matters, start with a number. A typical RSA-2048 certificate chain, end-entity certificate, intermediate, and root, runs somewhere between 3,000 and 4,500 bytes. ECC…

    Read More Post-Quantum Signatures and the Next Shift in PKI TrustContinue

  • Revocation Only Works If Someone Actually Checks
    Technical

    Revocation Only Works If Someone Actually Checks

    ByJames Moody March 14, 2026March 15, 2026

    Certificates can be revoked. That is one of the foundational safety valves of the public key infrastructure ecosystem. If a private key is compromised, the certificate binding that key to an identity can be invalidated. Clients can check revocation status through mechanisms like Certificate Revocation Lists (CRLs) or the Online Certificate Status Protocol (OCSP). On…

    Read More Revocation Only Works If Someone Actually ChecksContinue

  • Encryption After Upload Is Not Secure Key Management
    Technical

    Encryption After Upload Is Not Secure Key Management

    ByJames Moody March 14, 2026March 15, 2026

    Please don’t design another tool that asks for an unencrypted private key. Many systems claim strong cryptography. AES-256 encryption. Secure keystores. Protected storage. The encryption often starts after the most dangerous moment has already passed. A private key is generated somewhere. Then it is exported from a key store or certificate lifecycle management (CLM) system…

    Read More Encryption After Upload Is Not Secure Key ManagementContinue

  • Certificate Lifecycle Is Not a Renewal Reminder
    Technical

    Certificate Lifecycle Is Not a Renewal Reminder

    ByJames Moody March 14, 2026March 15, 2026

    The alert fires at 30 days. Someone renews the certificate. Everyone moves on. That is not lifecycle management. It is expiration management. It prevents one category of incident. It does not establish control. And it works right up until the scenario changes. Expiration Is a Symptom When a certificate expires and takes down a service, the…

    Read More Certificate Lifecycle Is Not a Renewal ReminderContinue

  • Encryption Protects Data. PKI Governs Trust.
    Technical

    Encryption Protects Data. PKI Governs Trust.

    ByJames Moody March 14, 2026March 15, 2026

    PKI often gets described as “the thing that enables encryption.” That’s not wrong. It’s incomplete, and the framing has a cost. Organizations think they bought encryption. They bought a certificate vending machine. If your PKI is a certificate vending machine, you don’t have infrastructure. You have exposure. Encryption is a primitive. It turns plaintext into…

    Read More Encryption Protects Data. PKI Governs Trust.Continue

© 2026 James Moody

All rights reserved. Warranty not included. Mileage may vary.

  • About
  • Contact
  • Posts
  • Privacy Policy