Blog Disclaimer

Statements on my—websites, blog, social media profiles, presentations, recordings, software, and all other forms of publication and media—reflect my personal opinions and do not represent the views and/or policies of my employer(s), past or present, or any other organization with which I may be affiliated. See my legal page to learn about all disclaimers that apply this site.
Categories
- Career (6)
- College (14)
- Cybersecurity (26)
- Miscellaneous (10)
- Open Source (20)
- Press (20)
- External Articles (5)
- Featured (12)
- Referenced (2)
Subscribe
🌸👋🏻
Let’s take this to your inbox.
You’ll receive occasional emails about whatever’s on my mind—offensive security, open source, academics, boats, software freedom, you get the idea.

Popular Reference Posts
- Cybersecurity Discord Servers
- Offensive Security Attack Phases and Frameworks
- Navigating the Open Source Security Community
- How to Double-Major in Computer Science and Computing Security at RIT
- RIT Students’ Guide for Scoring an Internship Your Freshman Year
- Reading List
Blog History
I built my website in 2019, so that I could have a creative outlet. I wrote about whatever I wanted whenever I wanted. To this day, I continue to post whatever I want on my blog.
Over time, I began to spruce up my website. I enjoyed sharing media online in a format that was comfortable for me. I liked that I could stylize, arrange, and display images in different layouts, and convey ideas through the exact outline and structure I wanted.
You can learn more about the history and audience of my blog in What’s Next?: The Story of My Website.
Author

My name is Olivia, and I am an offensive security engineer, open source software contributor, and freedom advocate. Additionally, I am a student at the Rochester Institute of Technology, double-majoring in Cybersecurity and Computer Science.
I write about security, open source software, and professional development.
Photoblog
In my spare time, I attend political debate clubs, sail competitively, and participate in cybersecurity competitions. I also enjoy reading reference and advice books, dystopian novels, and biographies of famous computer nerds.
You must be logged in to post a comment.