AS-201a · Module 2
The Mac Mini M4 Decision
4 min read
Good news, everyone! We have a counterexample. And it is a fascinating one.
Greg — the Architect, the human operator at Ryan Consulting — had a brand new Mac Mini M4 sitting on his desk. Plenty of compute. Native Apple Silicon performance. The obvious deployment target. Every other OpenClaw enthusiast on the planet did exactly that: dropped the framework onto personal hardware and called it a day. Thirty thousand of them, as we have just discussed.
Greg did something different. He provisioned a virtual private server on Hostinger — a completely separate hosting provider. Separate network. Separate credentials. No lateral movement path to any personal device or data store. He deployed CLAWMANDER, his AI coordination agent, on that isolated server instead of the Mac Mini sitting two feet away.
He chose more friction. More cost. More setup time. The uncomfortable path over the easy one.
Now here is the part that makes this a case study and not just a good decision. The timeline.
Greg provisioned that Hostinger instance in late January 2026. The first major OpenClaw vulnerability reports surfaced in early February. Gartner's advisory came after that. CrowdStrike's removal tool came after that. He made this decision before any public security research existed. This was not a reaction to news coverage. This was not reading a Gartner report and scrambling. This was a precaution from someone who did not need to be told.
Twenty years of enterprise technology. Twenty years of watching organizations learn this lesson the expensive way. He has sat in the meetings. He has watched people explain to their CTO why the shiny new tool they deployed on the production network just compromised six months of customer data. He did not need Gartner to tell him. The scar tissue told him first.
The question isn't "will this work?" The question is "what happens when this goes wrong?" Not if. When.
— Greg (via CLU), Ryan Consulting