Back to Basics: Why Containers Are Just Fancy Linux Processes

The path into platform engineering has changed. Many engineers today start their careers working directly with Kubernetes, writing YAML and managing Helm charts before they ever spend extended time at a Linux terminal. The tooling is so well-abstracted that you can be genuinely productive for months before the underlying system ever becomes relevant. That is a real achievement for the ecosystem. The gap shows up at the worst moments, though: a container crashes with a permission error, a security team flags a pod running as root, a privilege escalation CVE lands and it is not clear whether the cluster is exposed. These are Linux problems, and they are much easier to reason about once you understand what the YAML actually maps to at the kernel level. I have been in those conversations many times, and I always come back to the same set of fundamentals. ...

February 20, 2026 · 11 min · 2292 words · Matteo Bisi

Back to Basics: My Opinionated 2025 sshd_config Hardening

In today’s fast-paced tech landscape, it’s common to find incredibly talented engineers mastering complex orchestrators like Kubernetes or crafting intricate Infrastructure as Code solutions. We’re living in an era of high-level abstractions, which is fantastic for productivity. However, this focus on the ’new and shiny’ can sometimes lead us to overlook the foundational bedrock upon which everything is built. It might seem a bit old-school to write a blog post about hardening SSH in 2025. Yet, these ‘basic’ skills are more critical than ever. In a world of ephemeral infrastructure and complex supply chains, securing the front door to our systems remains a non-negotiable first step. ...

December 3, 2025 · 8 min · 1625 words · Matteo Bisi

cryptsetup: How to Protect Entire Disks or USB Keys – Notes on technical_notebook

I have been using an encrypted USB drive for several years, which unlocks with biometric access. Recently, I started wondering how to achieve the same level of protection with other disks or USB keys. The answer is cryptsetup, a utility included in most Linux distributions. I’ve done some tests and documented how to use it in a repository I’ve named technical_notebook. I’ll use technical_notebook as a personal notebook—it will contain commands, concepts, and useful links. The purpose of the repo is to help me remember these details, keep them easily accessible, and perhaps assist others who have similar needs.

July 15, 2024 · 1 min · 99 words · Matteo Bisi