About

About

I’m David Robinson, the Managing Partner and Practice Lead for Cloud & Cybersecurity at &How Intelligence, a specialist consulting company headquartered in Singapore.

I have spent more than three decades in technology, watching systems grow more complex, more connected and more fragile. Along the way, I moved from building and maintaining systems to breaking them, not for sport, but to understand whee they fail and why.

Void Protocols is where that work becomes a record.

What This Is

Void Protocols is a journal of traces left in the dark, the artifacts systems don’t intend to expose, the signals people forget to mask, and the assumptions that quietly become liabilities.

Here you’ll find CTF write-ups, OSINT research, exploit chains, and field notes from offensive security work. Some entries are technical deep dives. Others are observations about privacy, surveillance, and the way power expresses itself through data.

This isn’t a tutorial site. It’s documentation of thinking.

How I Work

Linux is my daily environment. No dual boots. No exceptions.

Open source isn’t ideology, it’s operational necessity. If you don’t know what your tools are doing, you don’t control them.

My professional work focuses on offensive security and adversary simulation, uncovering systemic weaknesses, challenging assumptions, and helping organizations understand risk beyond checklists and compliance frameworks. Cloud infrastructure, identity systems, web platforms, and hybrid environments are all fair ground.

In my role as managing partner, I operate at the intersection of technical depth and executive decision-making, translating real attack paths into strategic risk conversations that boards and leadership can actually act on.

Why Privacy Matters

Data has become leverage. Every interaction is logged. Every pattern analyzed. Every deviation flagged. Surveillance is no longer exceptional, it’s ambient.

Privacy isn’t about secrecy, It’s about autonomy. The ability to explore ideas, communicate, and exist without everything being captured, correlated, and repurposed. Once that’s gone, it doesn’t come back easily.

Areas of Focus

  • Offensive Security & Red Team Operations
  • OSINT, Reconnaissance, and Exposure Analysis
  • Linux Security & Systems Hardening
  • Cloud Exploitation (AWS, Azure, GCP)
  • Privacy Engineering, OpSec, and Threat Modeling