How to prevent the Wormhole hack (2022)

What are sysvar accounts? used for classic operations needed within the solana runtime What is Instructions sysvar? needed if an instruction needs to reference instructions in the same transaction How the Solana wormhole hack could have been prevented (and some hypotheticals).

Blog update 9/16

I’ve gotten lazy recently with my writing. My system of breaking down my writing organically into posts, chicken-scratch, and zettels hasn’t worked out how I’d want it to. I ended up producing a lot of draft zettels (little atomic learning notes), and not much else.

Risk Imperative: Watch the troughs, not the peaks

The main tenet from Antifragile is that we the people are miscalibrated about risks and rewards. If we calibrate, we can use the barbell method to protect ourselves from the terrible.

Writing a software contract

I’ve been working on starting a software collective, and spend a nontrivial amount of time doing non-technical things (namely discussions with clients and reading contracts). Here are some of the key points I’ve found so far, and what feels intuitive.

A summer in Auckland, New Zealand

I bought a one-way ticket to Auckland, New Zealand. With this one-way ticket, is also a two week mandatory quarantine period. This post will document my journey. Phone and data plan Vodafone NZ top-up Get currency and a way to withdraw Schwab

Working Holiday Visas for Digital Nomads

Something I’ve been thinking about as a dual citizen is what opportunities I have to travel. I want to move places and be a serial drifter, more than a true nomad but less than an expat.

Useful things to learn


Sci-fi List

I really enjoy reading sci-fi, and want to start to compile a list, and eventually an encyclopedia/knowledge engine of ideas and technologies present in each. This is also what I class as sci-fi, others, including original artist themselves may beg to differ.

TLDR: The Original Bitcoin Whitepaper

Bitcoin: A Peer-to-Peer Electronic Cash System One-Liner Bitcoin is an anonymous digital coin that changes hands based on unique cryptographic keys, validated through a decentralized distributed (P2P) ledger that A) is publicly-run by transaction chronology verification from decentralized volunteer compute nodes that solve a “proof-of-work” (proof of this node’s goodwill) in exchange for the coin itself and B) incentivizes actors with malicious intent to support the system because it is more profitable for them to perform A rather than attack it (antifragile).


I’m going to add another level of granularity to the notes of my website: Zettelkasten. I think there’s a strong case this will improve my learning and production. Blog posts are polished, well-researched, peer-reviewed pieces that take 15-20 hours to write.