You don’t bother to memorize the literature — you learn to read and keep a shelf of books.
Stand on Zanzibar, J. Brunner
Who I Am
I’m an American researcher who publishes on the internet under Everittius, a Latinized form of Everett.[1] My early interests centered on economics and science fiction. Now I investigate technical subjects I’ve studied and practiced professionally and personally. I am one of the few remaining work-from-home humans with a salary — humor. In addition, I am affiliated with a handful of research institutions. I’ll write about a variety of subjects both technical and explorative.[2] All content which resides in the everittius.net website contain my own viewpoints and should not be considered professional advice.
As this website develops, I’ll work towards disclosing more colorful context.
To save you the trouble: Domain Info ↩︎
By ‘technical’ I mean scientific, engineering, policy, and philosophical disciplines. ↩︎
What I Use
My office has a window, a simple bookshelf with an aesthetic selection, and a closet which serves as a library. The work table is a (4ft x 6ft) pneumatic height adjustable black desk. On it, a programmable lamp has a work profile to help manage my sleep routine. There is a framed photograph, live plant, coaster, notebook, mechanical pencil, and reference material. My headphones are only connected to my cell phone (discussed below). A 27″ acer monitor is centered, underneath is my workstation PC and my pro workstation. My personal backpack is the capra tamarao, a slnt sleeveremains inside it for travel.
I manage a custom Dell P7680 running Ubuntu and configured to meet a CIS Level 2 tailored profile.[1] [2] Several application layer rules are enforced; strict firewall settings, complete disabling of telemetries, disabling or removal of distributed AI tools, strict permission group profiles, etc. In addition I keep a suricata process active with a handful of community rules; a few custom rule sets are implemented to collect alerts for various reports, tracking of trackers, redirect patterns, and wireshark post processing.[3] All of my applications are simple and floss with a few exceptions where I use sandboxing. Typical tools that I use: arbtt; for screen time, tmux; for convenience, vscodium; for development and research, protonapps; for security, backup (via rclone service), mail, and password management, either tor browser, or a hardened profile of brave; for internet research, webmail, calendar, github, forums, and wordpress, signal; for convenience, evince; for viewing trusted documents, and my own zettelkasten setup and obsidian; for research, personal, and daily writing. Finally, I containerize via systemd-nspawn, firejail profiles, and apparmor for the following environments: LLM usage (brave, vpn, claude code, and vscodium), and banking.[4]
I paid cash for a Google Pixel 9 Pro which operates GrapheneOS. Credit goes to side of burritosfor app installation strategies, other resources are in the footnotes.[5] I have six profiles: admin; for system settings and app installation, daily; for daily usage which contains only signal, spotify, protonapps, and a selection of grapheneos native apps, travel; which contain only downloads of static openmaps; finance; for banking, auth; for 2FA, downtime; contains netflix, youtube, two news apps, and a set of bookmarks in Vanadium. All profiles have kill-switch protonvpn with full blocking, except for the admin profile which utilizes orbot. During application account creation I use the protonpass alias generator for emails, profile information generators for PII, and a cheap SMS rental service for one-time codes. All sensors are disabled until needed, app permissions are strictly necessary, a one-time setup of my headphones was performed with all telemetry disabled, finally for good measure if I travel I use a slnt sleeve. The last social media platform I used was Twitter — now X — almost seven years ago (from 2025). Before that, I had a MySpace (do you really want the number of years?). My device is primarily for Spotify, Signal, messaging, and downtime reading and also stays in the office while I’m home.
Solid GPU equipped for research support. ↩︎
Apparently the CIS benchmark is the only requirement according to NIST NCP. The tailored profile provides some flexibility to iptables and log groups. ↩︎
I have no strong requirement for IDS/IPS and the VPN and Tor layering helps. To be clear, my threat model does not warrant this level of hardening but the rationale aligns with …well, here are some practical keywords: consumer activism, digital privacy advocacy, cybersecurity. These umbrella terms suffice for the ‘What I Use’ section, though they are driven from longstanding philosophical exploration and practice. ↩︎
Duck Duck Go and Duck.ai are not that useful under Tor (or VPN) for higher quality search. Hence, the firejail and brave coupling. ↩︎
For reference: practical guide for the paranoid, grapheneos usage guide ↩︎