LogiiLabs
Honeypot · Audit · Cyberfrith
Icondb · glyph parade
🛡️1975 · mainframe locks
💾1983 · floppy ghosts
🕷️1999 · web bugs
📡2005 · wireless drift
🧬2015 · data trails
🤖2024 · ai traces
🕳️zero-day traps
🧭frith compass
🛡️1975 · mainframe locks
💾1983 · floppy ghosts
🕷️1999 · web bugs
📡2005 · wireless drift
🧬2015 · data trails
🤖2024 · ai traces
🕳️zero-day traps
🧭frith compass

CVE · CISA kev radar

Zero-day · exploited-in-wild

Operational entry point for tracking vulnerabilities that are publicly known and actively exploited. Use these links as your primary triage loop.

Time in wild focus Patch priority Evidence capture

Vendor psirt & advisories

Microsoft · Cisco · Palo Alto

Soc graphs & dashboards

Visualizer · flatware-ready

Reserved space for your live SOC-style graphs: honeypot hits, Time-in-Wild vs Time-in-LL curves, and drift tracking.

SOC chart hook: honeypot_hits(t), time_in_wild(t), time_in_ll(t)
Graph surface Tablet view Auditor screenshots

Honeypot traps · usb & web

Simulation · controlled

Space for documenting current trap kits (for example, USB honeypot campaigns, suspicious login forms, decoy document sets).

  • Register each trap with an ID, scenario, and purpose.
  • Track Time in LL (how long the trap has run in your environment).
  • Keep descriptions written for auditors and legal review.
Metric
Example
Time in Wild
~120 days (public CVE)
Time in LL
~7 days (honeypot active)

Global threats brief

Daily read list

Bookmark your preferred intelligence sources for quick daily sweeps.

Morning scan Board brief

Linguaglyph engine

Icondb · terminology

Use this panel to document the glyphs, icons, and terms used in your portal so teams and auditors read the visuals correctly.

  • 🛡️ = Defensive shield, defensive-only posture.
  • 🕷️ = Exploit / active threat under observation.
  • 🧭 = frith indicator: protective digital continuity.
  • 📊 = SOC visual, Time-in-Wild and Time-in-LL curves.
Glossary OSINT narrative

Osi reference model

Layer view

A compact OSI stack reference for training and documentation.

  • Layer 1 — Physical: wires, fiber, radio (bits on the line).
  • Layer 2 — Data Link: frames, MAC addresses, local access control.
  • Layer 3 — Network: IP routing, subnets, packet paths.
  • Layer 4 — Transport: TCP/UDP sessions and ports.
  • Layer 5 — Session: conversations and long-lived connections.
  • Layer 6 — Presentation: formats, encoding, TLS.
  • Layer 7 — Application: HTTP, SMTP, APIs, business logic.
Training Audit evidence

Language & learning lab

Public · private · institutional

Cross-sector references for LogiiLabs training: public standards, institutional teaching, private-sector practice, and language craft — one panel for lifelong study.

Etymology Style & rhetoric Training console
Frith & threat ticker
Frith: protective digital continuity — keep systems, people, and evidence in one calm, observable surface.
Time in Wild: shorten the distance between public CVE and your first internal control.
Time in LL: measure how long your honeypots run, not just when the report is written.
Validator loop: self-test, sibling labs, and reality checks for every metric you show.
Tablets first: design so an auditor on flatware can scroll once and understand everything.
Frith: protective digital continuity — keep systems, people, and evidence in one calm, observable surface.
Time in Wild: shorten the distance between public CVE and your first internal control.
Time in LL: measure how long your honeypots run, not just when the report is written.
Validator loop: self-test, sibling labs, and reality checks for every metric you show.
Tablets first: design so an auditor on flatware can scroll once and understand everything.