Posts

Showing posts from February, 2026

Life without Parole: Letters from Prison: Maureen

Image
Dear Lucy, I am glad you understand that no one has ever held an exclusive claim on my story. Much of what is known about me, and about the events that brought me my small measure of notoriety, now lies in the public domain. There are many who possess the skill to gather, organise, and shape that material into a convincing account of my life from publicly available sources, and I admire this ability immensely. My mother was not a woman who dwelt on her past, and I was very young when she left. What I have, I have pieced together from a handful of sentences she let fall over the years, from the few things others have uncovered after my story made national headlines, and from the particular kind of knowledge a child absorbs without quite knowing he is doing so. I offer it to you in that spirit. I hope you will use this story to advance the wider narrative about the failings of the justice system, and perhaps to uncover facts that, even now, remain unknown. Yours sincerely, Ky ...

How to create a local RAG-enabled LLM server that provides safe access to your documents

Image
This tutorial explains how to set up a headless RAG-enabled large language model (LLM) on an Ubuntu server. By the end, you will be able to chat with your LLM running locally on your own infrastructure. Your conversations will not be sent to third-party servers, ensuring that your prompts, responses, and any uploaded files remain private and under your control. A quick word on security Effective network security begins with a strong perimeter defence. One of the most critical steps is configuring a firewall on your router and hosts to explicitly deny all unsolicited inbound traffic from the internet. This “default deny” posture ensures that no internal services are accidentally exposed, creating a controlled environment where all communication is initiated from within your trusted network. A common and potentially dangerous misconception is that Network Address Translation (NAT) alone provides sufficient security. While NAT obscures internal devices, it is a routing mechanism rather...