Independent infrastructure engineer — self-hosted AI, agent systems, and digital sovereignty.
walking the line between arcane and algorithmic
Hamilton, Ontario 🇨🇦 · available for remote work
Recent: Maintainer of letta-external-memfs — endorsed by the Letta team as the recommended self-hosted memfs path. Primary developer of the Matrix channel adapter for letta-code and LettaBot.
Recommended self-hosted path for Letta memory persistence
Status: Endorsed by Letta team · community-maintained
Stack: TypeScript (client patch) + Python (server patch)
What: Direct git transport to external hosts (Gitea/GitHub/GitLab)
Server-side block sync endpoint (upstream PR pending)
Model: Aligned to Letta's own "git is source of truth, postgres cache"
The sidecar is gone. Self-hosters stop reinventing the workaround.
Matrix Channel Adapter — letta-code / LettaBot
Primary developer. Actively maintained alongside the core Letta team.
Features: rust-crypto E2EE · streaming text_delta · reaction approval UX
Voice (MSC3245) · encrypted media with localPath decryption
Slash command parity with Slack/Discord adapters
Matrix as a first-class Letta channel, not an afterthought.
Self-hosted update management for homelabs — shipping v1.0
Status: v1.0 shipping · 170 tests across 18 packages · production-hardened
Stack: Go + React + PostgreSQL
Security: Ed25519 command/binary signing · three-tier token auth
SHA256-bound machine IDs · nonce-based replay protection
Path-traversal-hardened binary delivery
Platforms: Linux (APT, DNF, Docker) | Windows (Windows Update, Winget)
Model: Pull-only agents · no inbound ports · firewall-friendly
Homelabs deserve enterprise-grade update management without the vendor lock-in.
💬 Discord Community
Local-first AI assistant — Android HID injection + multi-model orchestration
Status: Experimental / proof of concept
Stack: Android → PC via local/VPN'd Ollama inference
Gamified Linux documentation — cyberpunk sysadmin training
Status: 175★ after alpha · narrative-driven learning
- BackupPeer — P2P encrypted backup (WebRTC · NaCl/libsodium · TPM-anchored peer trust)
- GAML — GPU-accelerated GGUF model loader (parallel GPU vs. sequential CPU)
- Browser utilities — LocalQR · Local Image Optimizer · P2P Transfer (zero-backend, zero-tracking)
Agent & LLM Infrastructure:
- Letta self-hosted deployment · GitEnabledBlockManager internals
- Matrix bridge development (rust-crypto, E2EE event model, MSCs)
- Ollama clusters, local LLM deployment (CUDA/ROCm)
- Multi-model orchestration · vector embeddings · voice synthesis
Systems & Infrastructure:
- Proxmox, VMware, Hyper-V, Docker, Kubernetes, LXC · WireGuard, Traefik, Unifi
- Windows Server, Active Directory, Exchange, Office 365, hybrid AD Connect
- Zero-Trust architecture · site-to-site VPN mesh · enterprise Wi-Fi · cellular/LoRa
Security & Cryptography:
- Ed25519 signatures, JWT auth, three-tier token systems
- Replay protection, machine binding, firewall engineering
- Matrix E2EE internals · self-hosted security stacks
- Incident response · post-quantum-cryptography readiness
Languages:
Go · Python · TypeScript · C++ · PostgreSQL · React · Kotlin · PowerShell · Bash
Certifications:
CISA 100W — Cybersecurity for Industrial Control Systems · DOD Mandatory CUI Training
PHILOSOPHY Digital sovereignty over vendor lock-in.
Your data, your infrastructure, your control.
APPROACH Transparency in methods, not just results.
Lock the doors — and hand you the keys.
REALITY Ship bugs. Fix them. Log everything. Repeat.
ETHOS Self-hosted infrastructure is a practice, not a product.
Built for homelabs, not boardrooms.
25+ years in tech. First billable hours at 14 via dual enrollment. Started my first business at 17. Never stopped.
Scale and scope:
- 2000+ endpoints zero-downtime migrated across MSP engagements
- 150 interconnected servers decrypted and restored after a major ransomware incident — datacenter-level AD/DNS rebuild
- 150-user Office 365 administration + hybrid Exchange (museum deployment)
- 600+ automation scripts (PowerShell · Python · Bash) across ConnectWise Automate and custom RMM stacks
- Incident response alongside MoxFive — on-the-ground assessment during major US cyberattacks; field work in NYC, LA, Baltimore, Miami
- Clients spanning Fortune 500 aerospace/automotive manufacturers, world-famous resorts, fire departments, hospitals, and celebrity private networks
Trajectory: Click Here → Casey's Computers (owner) → Netcom → TechGuru → Future Data Systems → GW Lisk (Sr. NOC) → Advance2000 (Cybersecurity Engineer / Field Services Architect / AI Researcher) → Samaritan Solutions — Independent Technology Consultant (current)
Current focus: Agent infrastructure · self-hosted AI · Matrix bridges · homelab-grade security · data-sovereignty architecture.
Code: github.com/Fimeg · caseytunturi.com
Professional: linkedin.com/in/casey-tunturi
Open to: Remote (Canada-based) — full-time or contract.
Letta ecosystem · agent infra · Matrix / bridge development · self-hosted AI · security-heavy infrastructure.
☕ Buy Me a Coffee
Built with patience, coffee, and a healthy disregard for the cloud.
Hamilton, Ontario 🇨🇦