Skip to content

AI

The Star Chamber: Multi-LLM Consensus for Code Quality

Every AI model has blind spots. It might overlook context, lean toward certain patterns, or fill gaps with confident guesses. When you're using an AI coding agent to help with architecture decisions or code review, you're getting one perspective from one model. That's fine for straightforward work. But for decisions that shape the long-term direction of a codebase, one perspective isn't enough.

The Star Chamber is a skill for Claude Code that fans out code reviews and design questions to multiple LLM providers simultaneously, aggregates their feedback, and presents consensus-based recommendations. Think of it as a senior engineering council that reviews the same code independently, then you get a summary of where they agree and where they don't.

AI Growth Zones: Gift Horse or Trojan Horse?

In September 2025, the UK government announced an AI Growth Zone for the North East of England. The headline numbers sound impressive: £30 billion in potential investment, "up to 5,000 jobs", partnerships with Blackstone, OpenAI, and NVIDIA. Similar investments are happening globally. Microsoft alone is spending $80 billion on AI datacentres this year.

This is genuinely exciting. Regions like the North East that have been economically neglected for decades deserve investment in future industries. I'm not arguing against it.

But I have concerns about what we're building, who will own it, and what happens to our data from day one.

Why I'm Building Toward Sovereign AI

I've been spending evenings and weekends on something that might sound idealistic: infrastructure for personal data sovereignty. But I'm not building it because I think it'll definitely work. I'm building it because the alternative - doing nothing - seems worse.

MCP's Identity Crisis: When Security Theatre Meets Enterprise Reality

The Model Context Protocol (MCP) promises to be the "USB-C" of LLM integrations; simple, universal, and "extremely easy to build." Yet a fundamental disconnect exists between its security guidance and how authentication works in production systems. This isn't just a theoretical concern; it's creating an ecosystem where even official implementations can't follow the stated best practices.