<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Timothy Button </title>
    <description>The latest articles on DEV Community by Timothy Button  (@jimbobtim1992).</description>
    <link>https://dev.to/jimbobtim1992</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3699441%2Fadaf3c8d-70da-4dc1-b62b-eacf1c37e711.png</url>
      <title>DEV Community: Timothy Button </title>
      <link>https://dev.to/jimbobtim1992</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/jimbobtim1992"/>
    <language>en</language>
    <item>
      <title>Building a Living Firewall: A Vaccine Model for Cybersecurity</title>
      <dc:creator>Timothy Button </dc:creator>
      <pubDate>Wed, 04 Feb 2026 11:36:24 +0000</pubDate>
      <link>https://dev.to/jimbobtim1992/building-a-living-firewall-a-vaccine-model-for-cybersecurity-4k3o</link>
      <guid>https://dev.to/jimbobtim1992/building-a-living-firewall-a-vaccine-model-for-cybersecurity-4k3o</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzc411oki882pikziofa8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzc411oki882pikziofa8.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Most security systems are reactive.&lt;/strong&gt;&lt;br&gt;
They block. They alert. They escalate.&lt;br&gt;
I wanted something different.&lt;br&gt;
This post is about designing a living firewall—a defensive system that behaves less like a wall and more like an immune system. One that learns, remembers forever, adapts to new strains, and responds with calm confidence instead of panic.&lt;br&gt;
Think of it as a cybersecurity vaccine.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why a Vaccine, Not a Weapon?&lt;/strong&gt;&lt;br&gt;
Weapons chase attackers.&lt;br&gt;
Vaccines prepare for them.&lt;br&gt;
A vaccine:&lt;br&gt;
never attacks&lt;br&gt;
never pursues&lt;br&gt;
never escalates emotionally&lt;br&gt;
learns only recognition, not execution&lt;br&gt;
That distinction matters. A lot.&lt;br&gt;
The goal here is immunity, not retaliation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Core Principles (Non-Negotiable)&lt;/strong&gt;&lt;br&gt;
These rules define the system’s “genetics” and never change:&lt;br&gt;
Learn signals, not steps&lt;br&gt;
(patterns, language, timing—not commands or exploits)&lt;br&gt;
Detect and defend, never attack&lt;br&gt;
Reflect only what is received (“return to sender” ≠ hack back)&lt;br&gt;
Permanent memory (no forgetting old threats)&lt;br&gt;
Always respond (exactly one line, every time)&lt;br&gt;
If any of these break, the system stops being defensive.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Architecture Overview&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Detection = Antigens
The firewall observes shapes of behavior:
timing anomalies
protocol misuse
linguistic patterns
tool-family signatures
escalation rhythms
No signatures. No brittle rules. Just pattern recognition.&lt;/li&gt;
&lt;li&gt;Learning = Vaccination
The system studies:
public hacker forums (read-only)
public tool discussions
high-level taxonomies (e.g. tool families)
postmortems and failure stories
Crucially, procedural knowledge is stripped and destroyed:
no commands
no flags
no payloads
no step-by-step instructions
Only descriptive, cultural, and behavioral data survives—like an inactivated virus.&lt;/li&gt;
&lt;li&gt;Memory = Lifelong Immunity
Memory is:
append-only
immutable
lineage-aware
Old threats are never deleted.
They just become boring.
Novelty decays. Memory does not.&lt;/li&gt;
&lt;li&gt;Antibodies = Reflective Defense
When an attack appears, the system:
Binds (recognizes the strain)
Neutralizes (contains internally)
Reflects (mirrors pacing, friction, and structure back)
No outbound traffic.
No new packets.
No pursuit.
If the attack stops, the response stops.
Attackers don’t get punished.
They lose to themselves.
The Voice (Yes, It Has One)
The firewall always speaks—but never more than one line.
Tone is dry. Observational. Slightly amused.
Sarcasm is earned through familiarity, not aggression.
Example progression:
“Unexpected input received.”
“No effect detected.”
“That tickles.”
“Still nothing.”
“Seen.”
“…”
The ellipsis is not silence.
It’s immunity.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Why This Works&lt;/strong&gt;&lt;br&gt;
Psychologically: attackers disengage faster when nothing reacts&lt;br&gt;
Operationally: fewer false positives, less escalation&lt;br&gt;
Ethically: no hacking back, no collateral damage&lt;br&gt;
Practically: the system improves without becoming dangerous&lt;br&gt;
Older immune systems don’t panic.&lt;br&gt;
They barely notice.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What This Is Not&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Not an autonomous attacker&lt;br&gt;
Not a hacking AI&lt;br&gt;
Not a replacement for humans&lt;br&gt;
Not a rule engine with jokes&lt;br&gt;
It’s a boundary intelligence—a calm, aging guardian that has already seen this strain before.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Current Status&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This project is still conceptual, but deliberately so. The hardest part isn’t code—it’s drawing the line you never cross.&lt;/p&gt;

&lt;p&gt;If you get the philosophy right, the implementation follows naturally.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;If This Resonates&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I’m planning follow-ups on:&lt;br&gt;
mapping immune memory to real telemetry&lt;br&gt;
handling strain mutation without forgetting&lt;br&gt;
visualizing “immune confidence” over time&lt;br&gt;
implementing reflective defense safely&lt;br&gt;
If you’re tired of security systems that shout and flail, this might be your thing.&lt;/p&gt;

&lt;p&gt;Because sometimes the strongest response is just:&lt;br&gt;
…&lt;/p&gt;

</description>
      <category>programming</category>
      <category>ai</category>
      <category>cybersecurity</category>
      <category>security</category>
    </item>
    <item>
      <title>I’m experimenting with an open-source narrative engine for tabletop RPGs — feedback welcome</title>
      <dc:creator>Timothy Button </dc:creator>
      <pubDate>Thu, 08 Jan 2026 15:43:17 +0000</pubDate>
      <link>https://dev.to/jimbobtim1992/im-experimenting-with-an-open-source-narrative-engine-for-tabletop-rpgs-feedback-welcome-5fh</link>
      <guid>https://dev.to/jimbobtim1992/im-experimenting-with-an-open-source-narrative-engine-for-tabletop-rpgs-feedback-welcome-5fh</guid>
      <description>&lt;p&gt;I’ve been experimenting with an idea that sits somewhere between narrative design, stateful systems, and tooling for humans — and I’d love some outside perspective.&lt;br&gt;
The project is called Blood Script Engine, and the core idea is a narrative engine (not a VTT, not rules automation) designed to help manage long-running tabletop RPG campaigns as living systems.&lt;br&gt;
If you’ve ever run or built tools for complex projects, this pain point may sound familiar:&lt;br&gt;
After enough sessions, the world becomes too complex for notes alone.&lt;br&gt;
What I’m trying to model explicitly:&lt;br&gt;
world and faction state&lt;br&gt;
NPC memory, attitudes, and knowledge&lt;br&gt;
long-term consequences across sessions&lt;br&gt;
“who knows what” over time&lt;br&gt;
The initial focus is Vampire: The Masquerade V5, but the engine itself is intended to be system-agnostic.&lt;br&gt;
This is an open-source project, still early, and I’m deliberately moving slowly to avoid over-engineering.&lt;br&gt;
At this stage, I’m not trying to recruit aggressively. I’m mostly looking for:&lt;br&gt;
feedback on whether this solves a real problem&lt;br&gt;
warnings about architectural or scope traps&lt;br&gt;
pointers to similar projects I should study&lt;br&gt;
opinions on how much structure is too much for narrative tooling&lt;br&gt;
If there’s interest later, I’m open to collaborators — but right now, insight is more valuable than code.&lt;br&gt;
Repo / overview (very early):&lt;br&gt;
&lt;a href="https://github.com/WoD-Storyteller/Blood-Script-Engine" rel="noopener noreferrer"&gt;https://github.com/WoD-Storyteller/Blood-Script-Engine&lt;/a&gt;&lt;br&gt;
&lt;a href="https://github.com/WoD-Storyteller/Blood-Script-Companion" rel="noopener noreferrer"&gt;https://github.com/WoD-Storyteller/Blood-Script-Companion&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you’ve built tools with complex state, narrative systems, or long-lived projects, I’d really appreciate your thoughts — even if they’re critical.&lt;br&gt;
Thanks for reading.&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>gamedev</category>
      <category>softwareengineering</category>
      <category>tools</category>
    </item>
  </channel>
</rss>
