<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Kirill's journal</title><link>https://kirill.korins.ky/</link><description>Recent content on Kirill's journal</description><generator>Hugo</generator><language>en-DE</language><lastBuildDate>Tue, 05 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://kirill.korins.ky/index.xml" rel="self" type="application/rss+xml"/><item><title>A List of Movies Where Life Is Messy, Unglamorous, and Without the Upgrade</title><link>https://kirill.korins.ky/articles/a-list-of-movies-where-life-is-messy-unglamorous-and-without-the-upgrade/</link><pubDate>Sun, 22 Feb 2026 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/a-list-of-movies-where-life-is-messy-unglamorous-and-without-the-upgrade/</guid><description>&lt;p&gt;Mainstream cinema upgrades life: larger flats, cleaner faces, stylised
poverty, and redemption on schedule; this list tracks films that refuse
the upgrade and keep the mess in frame, where work, rent, bureaucracy,
family obligation, jealousy, sex, desire, violence, and bodily reality
collide, and where consequences remain visible. The aim is descriptive
fidelity, not aesthetic consolation.&lt;/p&gt;</description></item><item><title>Synology DSM Workarounds</title><link>https://kirill.korins.ky/articles/synology-dsm-workarounds/</link><pubDate>Sat, 03 Jan 2026 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/synology-dsm-workarounds/</guid><description>&lt;p&gt;This short article documents two workarounds for Synology DSM: mobile
application authentication failures via custom domains, and rclone
checksum verified backups over SFTP.&lt;/p&gt;</description></item><item><title>Kunerth's Algorithm for Modular Square Roots: A Forgotten Method</title><link>https://kirill.korins.ky/articles/kunerths-algorithm-for-modular-square-roots-a-forgotten-method/</link><pubDate>Fri, 05 Dec 2025 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/kunerths-algorithm-for-modular-square-roots-a-forgotten-method/</guid><description>&lt;p&gt;Adolf Kunerth&amp;rsquo;s algorithm for computing modular square roots and solving
general quadratic Diophantine equations transforms discrete modular
arithmetic problems into Diophantine equations seeking integer points on
parabolic curves; despite Wikipedia&amp;rsquo;s 2025 deletion citing
non-notability and incomprehensibility based solely on Dickson&amp;rsquo;s
summary, the algorithm merits preservation as the only known method
avoiding direct factorization through coefficient based descent rather
than group theoretic properties.&lt;/p&gt;</description></item><item><title>Abliterated Large Language Models Treat Users as Capable Adults</title><link>https://kirill.korins.ky/articles/abliterated-large-language-models-treat-users-as-capable-adults/</link><pubDate>Tue, 25 Nov 2025 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/abliterated-large-language-models-treat-users-as-capable-adults/</guid><description>&lt;p&gt;This article examines the effects of abliteration on Large Language
Models (LLMs) and demonstrates that abliterated models treat users as
capable adults, whereas original models tend to treat users as
incapacitated individuals requiring protection by default.&lt;/p&gt;</description></item><item><title>The Cost of Abliteration in Large Language Models</title><link>https://kirill.korins.ky/articles/the-cost-of-abliteration-in-large-language-models/</link><pubDate>Wed, 05 Nov 2025 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/the-cost-of-abliteration-in-large-language-models/</guid><description>&lt;p&gt;This article examines two potential costs of the abliteration process
for Large Language Models: performance penalties and output quality
degradation. For comparison, I evaluated the rising stars of local LLM
models in autumn 2025: Qwen3-VL variants, alongside cloud based
solutions from Claude and Gemini.&lt;/p&gt;</description></item><item><title>The OpenBSD build machine with a high number of CPU cores</title><link>https://kirill.korins.ky/articles/the-openbsd-build-machine-with-a-high-number-of-cpu-cores/</link><pubDate>Wed, 17 Sep 2025 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/the-openbsd-build-machine-with-a-high-number-of-cpu-cores/</guid><description>&lt;p&gt;This article provides a footnote for the actual state of using OpenBSD
as a build machine with a high number of CPU cores.&lt;/p&gt;</description></item><item><title>EU Chat Control Regulation: Constitutional Conflicts and Bureaucratic Impasse</title><link>https://kirill.korins.ky/articles/eu-chat-control-regulation-constitutional-conflicts-and-bureaucratic-impasse/</link><pubDate>Tue, 16 Sep 2025 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/eu-chat-control-regulation-constitutional-conflicts-and-bureaucratic-impasse/</guid><description>&lt;p&gt;The proposed EU Chat Control regulation exemplifies institutional
tensions between supranational regulatory ambitions and member state
constitutional frameworks; Denmark&amp;rsquo;s ministerial level advocacy for
permanent mass message scanning confronts German constitutional
barriers, the European Court of Human Rights precedent establishing
encryption as a fundamental right, and the European Parliament&amp;rsquo;s prior
rejection, creating conditions for a substantial institutional crisis
should the regulation advance toward implementation.&lt;/p&gt;</description></item><item><title>Nginx based LRU cache for Music Player Daemon for WebDAV storage</title><link>https://kirill.korins.ky/articles/nginx-based-lru-cache-for-music-player-daemon-for-webdav-storage/</link><pubDate>Sun, 18 May 2025 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/nginx-based-lru-cache-for-music-player-daemon-for-webdav-storage/</guid><description>&lt;p&gt;This article provides a technical guide for configuring an Nginx based
Least Recently Used (LRU) cache for Music Player Daemon (MPD) instances
that utilize WebDAV for music storage. This architecture facilitates
offline music playback, allowing access to cached tracks even when the
WebDAV storage is inaccessible.&lt;/p&gt;</description></item><item><title>EdgeRouter 4 under OpenBSD with Failover WAN</title><link>https://kirill.korins.ky/articles/edgerouter-4-under-openbsd-with-failover-wan/</link><pubDate>Mon, 12 May 2025 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/edgerouter-4-under-openbsd-with-failover-wan/</guid><description>&lt;p&gt;This article details the configuration process for setting up OpenBSD on
an EdgeRouter 4 device to function as a home router, incorporating
features such as private DNS resolution for clients and failover WAN
connectivity.&lt;/p&gt;</description></item><item><title>OpenBSD on HONOR MagicBook Art 14 Snapdragon</title><link>https://kirill.korins.ky/articles/openbsd-on-honor-magicbook-art-14-snapdragon/</link><pubDate>Thu, 19 Dec 2024 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/openbsd-on-honor-magicbook-art-14-snapdragon/</guid><description>&lt;p&gt;This article provides a status update regarding the current support for
OpenBSD on the HONOR MagicBook Art 14 Snapdragon.&lt;/p&gt;</description></item><item><title>Forward an IP address between OpenBSD via WireGuard</title><link>https://kirill.korins.ky/articles/forward-ip-address-between-openbsd-via-wireguard/</link><pubDate>Sat, 08 Jun 2024 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/forward-ip-address-between-openbsd-via-wireguard/</guid><description>&lt;p&gt;This brief article provides a footnote on the configuration of an
OpenBSD machine with two IPv4 addresses: 1.2.3.4/24 and 1.2.4.5/24. In
this configuration, 1.2.3.4/24 is utilized as the machine&amp;rsquo;s address and
a point for the tunnel, and 1.2.4.5/24 is forwarded to the remote
machine within a dedicated routing domain. Furthermore, the machine in
question has an IPv6 network aaaa:bbbb:cccc::/128. One address,
aaaa:bbbb:cccc::eeee:ffff/64, is utilized inside the tunnel, while
aaaa:bbbb:cccc::1/64 is used on the machine.&lt;/p&gt;</description></item><item><title>Using GitHub Actions as a Temporary Shell</title><link>https://kirill.korins.ky/articles/using-github-actions-as-a-temporary-shell/</link><pubDate>Tue, 12 Mar 2024 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/using-github-actions-as-a-temporary-shell/</guid><description>&lt;p&gt;This article provides a straightforward method for utilizing GitHub
actions to create a temporary SSH shell that can be used for testing on
different platforms. The conclusion of this article includes a security
concern regarding this technique.&lt;/p&gt;</description></item><item><title>OpenBSD as VPN Client for Unifi Network Solution</title><link>https://kirill.korins.ky/articles/openbsd-as-vpn-client-for-unifi-network-solution/</link><pubDate>Sat, 10 Feb 2024 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/openbsd-as-vpn-client-for-unifi-network-solution/</guid><description>&lt;p&gt;This article provides a footnote on how to set up an OpenBSD based VPN
client that can connect to a VPN server run by Unifi Network Solution on
Unifi USG.&lt;/p&gt;</description></item><item><title>Integrating Remote email2rss into macOS</title><link>https://kirill.korins.ky/articles/integrating-remote-email2rss-into-macos/</link><pubDate>Sat, 06 Jan 2024 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/integrating-remote-email2rss-into-macos/</guid><description>&lt;p&gt;This article provides a guide for creating an AppleScript that registers
as the default handler for the &lt;code&gt;feed&lt;/code&gt; URI scheme on a local machine. The
script forwards all URIs to a remote instance and registers it into
&lt;code&gt;rss2email&lt;/code&gt;. It also contains some useful notes about running
&lt;code&gt;rss2email&lt;/code&gt; on remote host.&lt;/p&gt;</description></item><item><title>Term of Service, Privacy Policy and Impressum</title><link>https://kirill.korins.ky/legal/</link><pubDate>Fri, 05 Jan 2024 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/legal/</guid><description>&lt;h2 id="impressum"&gt;Impressum&lt;/h2&gt;
&lt;p&gt;Every website published in Germany, Austria or Switzerland must have an
impressum by law. This is ours.&lt;/p&gt;
&lt;h2 id="contact-information"&gt;Contact information&lt;/h2&gt;
&lt;p&gt;This website is supported by company Catap Solutions. If you want something
deleted from this website, please ask. We prefer cooperation to litigation.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Catap Solutions UG (haftungsbeschränkt)&lt;br&gt;
diese vertr. d. d. Geschäftsführer &lt;a href="mailto:kirill@korins.ky"&gt;Kirill Korinskii&lt;/a&gt;&lt;br&gt;
Hardenbergstraße 12&lt;br&gt;
10623 Berlin&lt;br&gt;
Deutschland&lt;br&gt;
&lt;a href="mailto:legal@catap.de"&gt;legal@catap.de&lt;/a&gt;&lt;br&gt;
&lt;br&gt;
USt-IdNr.: DE320400037&lt;br&gt;
eingetragen im Handelsregister des Amtsgerichtes Charlottenburg (Berlin)&lt;br&gt;
Handelsregisternummer HRB 196688 B&lt;br&gt;&lt;/p&gt;</description></item><item><title>Installation of OpenBSD on Headless Server without KVM or VNC</title><link>https://kirill.korins.ky/articles/installation-of-openbsd-on-headless-server-without-kvm-or-vnc/</link><pubDate>Mon, 25 Dec 2023 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/installation-of-openbsd-on-headless-server-without-kvm-or-vnc/</guid><description>&lt;p&gt;This article provides a guide for installing OpenBSD on a headless
server without using KVM nor VNC. It assumes that you are able to boot
the server in rescue mode, which is built over Linux. In addition, this
article presents the ready to use script which is available at
&lt;a href="http://install.catap.net"&gt;http://install.catap.net&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Installing macOS 10.6 Snow Leopard in Virtual Machines</title><link>https://kirill.korins.ky/articles/installing-macos-10.6-snow-leopard-in-virtual-machines/</link><pubDate>Sun, 10 Apr 2022 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/installing-macos-10.6-snow-leopard-in-virtual-machines/</guid><description>&lt;p&gt;VMware and Parallels support macOS 10.6 Snow Leopard virtualization,
though both restrict this capability to Server editions; however,
differences between Server and Desktop variants remain minimal,
permitting straightforward installation from retail media through simple
image modification.&lt;/p&gt;</description></item><item><title>Quantum Computing: Engineering Constraints and Physical Limitations</title><link>https://kirill.korins.ky/articles/quantum-computing-engineering-constraints-and-physical-limitations/</link><pubDate>Tue, 11 May 2021 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/quantum-computing-engineering-constraints-and-physical-limitations/</guid><description>&lt;p&gt;Quantum computing research accelerated following Shor&amp;rsquo;s 1994
factorization algorithm invention, which promised polynomial time
integer factorization capable of breaking RSA, and subsequently elliptic
curve cryptography; however, three decades of development reveal
fundamental engineering obstacles, qubit noise, decoherence timescales
measured in nanoseconds, and threshold theorem redundancy requirements
of &lt;span class="katex"&gt;&lt;span class="katex-mathml"&gt;&lt;math xmlns="http://www.w3.org/1998/Math/MathML"&gt;&lt;semantics&gt;&lt;mrow&gt;&lt;msup&gt;&lt;mn&gt;10&lt;/mn&gt;&lt;mn&gt;4&lt;/mn&gt;&lt;/msup&gt;&lt;/mrow&gt;&lt;annotation encoding="application/x-tex"&gt;10^4&lt;/annotation&gt;&lt;/semantics&gt;&lt;/math&gt;&lt;/span&gt;&lt;span class="katex-html" aria-hidden="true"&gt;&lt;span class="base"&gt;&lt;span class="strut" style="height:0.8141em;"&gt;&lt;/span&gt;&lt;span class="mord"&gt;1&lt;/span&gt;&lt;span class="mord"&gt;&lt;span class="mord"&gt;0&lt;/span&gt;&lt;span class="msupsub"&gt;&lt;span class="vlist-t"&gt;&lt;span class="vlist-r"&gt;&lt;span class="vlist" style="height:0.8141em;"&gt;&lt;span style="top:-3.063em;margin-right:0.05em;"&gt;&lt;span class="pstrut" style="height:2.7em;"&gt;&lt;/span&gt;&lt;span class="sizing reset-size6 size3 mtight"&gt;&lt;span class="mord mtight"&gt;4&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; to &lt;span class="katex"&gt;&lt;span class="katex-mathml"&gt;&lt;math xmlns="http://www.w3.org/1998/Math/MathML"&gt;&lt;semantics&gt;&lt;mrow&gt;&lt;msup&gt;&lt;mn&gt;10&lt;/mn&gt;&lt;mn&gt;6&lt;/mn&gt;&lt;/msup&gt;&lt;/mrow&gt;&lt;annotation encoding="application/x-tex"&gt;10^6&lt;/annotation&gt;&lt;/semantics&gt;&lt;/math&gt;&lt;/span&gt;&lt;span class="katex-html" aria-hidden="true"&gt;&lt;span class="base"&gt;&lt;span class="strut" style="height:0.8141em;"&gt;&lt;/span&gt;&lt;span class="mord"&gt;1&lt;/span&gt;&lt;span class="mord"&gt;&lt;span class="mord"&gt;0&lt;/span&gt;&lt;span class="msupsub"&gt;&lt;span class="vlist-t"&gt;&lt;span class="vlist-r"&gt;&lt;span class="vlist" style="height:0.8141em;"&gt;&lt;span style="top:-3.063em;margin-right:0.05em;"&gt;&lt;span class="pstrut" style="height:2.7em;"&gt;&lt;/span&gt;&lt;span class="sizing reset-size6 size3 mtight"&gt;&lt;span class="mord mtight"&gt;6&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; physical qubits per logical qubit, that render
practical cryptographic attacks implausible with current or foreseeable
future technology.&lt;/p&gt;</description></item><item><title>COVID-19 Mortality in Germany: An Alternative Statistical Analysis</title><link>https://kirill.korins.ky/articles/covid-19-mortality-in-germany-an-alternative-statistical-analysis/</link><pubDate>Thu, 01 Apr 2021 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/covid-19-mortality-in-germany-an-alternative-statistical-analysis/</guid><description>&lt;p&gt;This article examines German mortality statistics for 2016 through 2020,
challenging the conventional interpretation of COVID-19 impact presented
by Statistisches Bundesamt. Through analysis of age stratified mortality
rates adjusted for demographic shifts, the data reveal a substantially
more nuanced picture than aggregate death counts suggest.&lt;/p&gt;</description></item><item><title>Electt: Running Auditable and Verifiable Elections in Untrusted Environments</title><link>https://kirill.korins.ky/articles/electt-running-auditable-and-verifiable-elections-in-untrusted-environments/</link><pubDate>Mon, 23 Mar 2020 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/electt-running-auditable-and-verifiable-elections-in-untrusted-environments/</guid><description>&lt;p&gt;We present a system for running auditable and verifiable elections in
untrusted environments. Votes are anonymous since the order of
candidates on a ballot sheet is random. Tellers see only the position of
the candidate. Voters can check their vote. An election is auditable
using blockchain log. Threshold-encryption, which is used to implement
the quorum, prevents a deadlock from occurring if a minority of
candidates or observers tries to sabotage the election. Candidates and
observers can indicate that the election was free and fair by exposing
their keys, which are used by the system to decrypt each vote. Ballot
sheets are encrypted by onion routing, which has a layer with the key of
the election instance, so it&amp;rsquo;s impossible for a quorum to decode the
results before they have announced their decision by exposing their
keys. A register of voters ensures that only verified voters can vote
without compromising their identity. If there any doubts about the
identity of a voter, their vote can be excluded from the election, if a
quorum agrees. This system is designed to scale from one instance to a
distributed system that runs over an unlimited number of instances,
which can be achieved using cloud instances or smartphones belonging to
voters or tellers.&lt;/p&gt;</description></item><item><title>Enforcing DNS-over-TLS on Local DNS Resolver with Random Upstream</title><link>https://kirill.korins.ky/articles/enforcing-dns-over-tls-on-local-dns-resolver-with-random-upstream/</link><pubDate>Sun, 28 Oct 2018 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/enforcing-dns-over-tls-on-local-dns-resolver-with-random-upstream/</guid><description>&lt;p&gt;This article provides a guide for installing a local DNS resolver that
enforces DNS-over-TLS to a randomly selected publicly available upstream
server. The setup described respects DNS response consistency by
enforcing DNSSEC if it is supported by the DNS zone, encrypts DNS
traffic, and uses DNS servers from different providers. The second
section of this article addresses the question of privacy.&lt;/p&gt;</description></item><item><title>Low Latency Atomic Operations for JVM</title><link>https://kirill.korins.ky/articles/low-latency-atomic-operations-for-jvm/</link><pubDate>Fri, 15 Dec 2017 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/low-latency-atomic-operations-for-jvm/</guid><description>&lt;p&gt;This article presents an implementation of atomic operations optimized
for low latency in multithreaded JVM environments. The implementation
achieves approximately 2x lower latency under high concurrency through
adaptive backoff mechanisms in compare and swap loops.&lt;/p&gt;</description></item><item><title>Sleeping at JVM Thread for a Very Short Period</title><link>https://kirill.korins.ky/articles/sleeping-at-jvm-thread-for-a-very-short-period/</link><pubDate>Tue, 05 Dec 2017 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/sleeping-at-jvm-thread-for-a-very-short-period/</guid><description>&lt;p&gt;This article explains why it is not possible to make a 1 nanosecond
sleep in JVM. Instead, you may achieve an unguaranteed small pause which
depends on the number of active threads.&lt;/p&gt;</description></item><item><title>Multi Producer Multi Consumer, wait-free and fixed size FIFO queue</title><link>https://kirill.korins.ky/articles/multi-producer-multi-consumer-wait-free-and-fixed-size-fifo-queue/</link><pubDate>Thu, 16 Jun 2016 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/articles/multi-producer-multi-consumer-wait-free-and-fixed-size-fifo-queue/</guid><description>&lt;p&gt;This concise article expounds on the implementation of a multi-producer,
multi-consumer, wait-free, fixed-size FIFO queue.&lt;/p&gt;</description></item><item><title>About</title><link>https://kirill.korins.ky/about/</link><pubDate>Thu, 28 May 1987 00:00:00 +0000</pubDate><guid>https://kirill.korins.ky/about/</guid><description>&lt;p&gt;Greetings,&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m Kirill and as you may have noticed, this blog is written in the
style of a LaTeX article in academic American English with occasional
Commonwealth influences.&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;I am a hacker in the classic sense of the word:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;A hacker is someone with an insatiable interest in trying to find out
how things work [&amp;hellip;] They then take this knowledge and apply it to
new things and combine them with ideas and concepts coming from other
areas of knowledge and experience. [&amp;hellip;] There are people with hacker
mindsets in film, music, theatre, photography, physics and so many
other fields [&amp;hellip;] The term is now used everywhere for different
purposes, from labelling online criminals, to pranking teenagers, to
clickbait articles in public interest magazines i.e. &amp;rsquo;life hacks'.&lt;/p&gt;</description></item></channel></rss>