This site uses essential session cookies and a locally-hosted AI model for the chat feature. No personal data is sold, shared, or sent to third-party AI providers. All AI responses are generated on a sovereign self-hosted server. By continuing you agree to these terms under GDPR/CCPA standards.

₿ Bitcoin

BC1Q3KCGXA4F7M3WWVSQV4W6329VSMRCQXFW62D6LU
Copied ✓
$ whoami

@leonxotl

Sovereign AI Builder · Local Models · Bootstrapped

@leonxotl on X
Building with local AI models. I run everything sovereign — no OpenAI, no cloud APIs, no VC money. Just a VPS, Ollama, and whatever I can ship between midnight and sunrise. Published researcher. Scrappy founder. I build things that work.
talk to my ai
gemma3:4b · local node · online
Connected to local node. Ask me anything.
ls ./projects
cat ./research.bib
@leonxotl:~$ cat research/2016-buffer-overflow.md
Peer-reviewed · Open Access · ScienceDirect

Counter-Measures against Stack Buffer Overflows in GNU/Linux Operating Systems

Erick Leon, Stefan D. Bruda — Procedia Computer Science, 2016

A runtime mechanism to detect and react to stack buffer overflow attacks in GNU/Linux — zero compile-time support required, applicable to any program including legacy and closed-source software. Especially relevant for HPC environments.

DOI 10.1016/j.procs.2016.04.270 Open Access Creative Commons GNU/Linux · HPC · Cybersecurity