Multi-Factor Authentication: Security Control or Single Point of Failure?

Introduction

Multi-Factor Authentication (MFA) has become one of the most widely promoted security controls in modern digital services. Registrars, hosting providers, cloud platforms, and identity providers increasingly present MFA as a non-negotiable requirement, often mandating it as a condition of account access.

From a purely technical perspective, the argument is compelling: MFA reduces the effectiveness of stolen credentials and raises the cost of attack. From a legal, compliance, and operational standpoint, however, the picture is far more complex.

This article does not argue against MFA itself. Instead, it examines the systemic risks introduced by mandatory MFA, particularly when it is implemented without regard for real-world failure modes, recovery obligations, or the legal consequences of denying legitimate access to critical accounts.

For registrars, service providers, and security professionals, the key question is not “Does MFA improve security?” but rather:

“Does this MFA implementation reduce overall risk, or does it merely shift liability while creating new points of catastrophic failure?”

What MFA Is Intended to Do

The primary purpose of MFA is to mitigate credential compromise. If a password is stolen through phishing, malware, or reuse across breached services, MFA should prevent unauthorised access by requiring an additional factor.

In security frameworks, MFA is commonly categorised as a preventive control, not a compensating or detective one. Its effectiveness assumes:

  • Independence between authentication factors
  • Availability of the second factor
  • A functional and accessible recovery mechanism

When these assumptions fail, MFA ceases to be a safeguard and becomes an availability risk.

Mandatory MFA and the Loss of User Agency

From a compliance standpoint, mandatory MFA is often justified using language such as “industry best practice”“risk reduction”, or “duty of care”. However, mandating a control without accommodating edge cases introduces legal and operational exposure.

The Legal Tension

In regulated or quasi-regulated environments (including registrars), providers owe users:

  • Reasonable access to services they have paid for
  • Predictable and documented recovery mechanisms
  • Proportional security controls

A mandatory MFA policy that results in irreversible account loss due to foreseeable circumstances may be defensible from a policy standpoint, but it is increasingly difficult to defend from a consumer protection or negligence perspective.

Security controls must be proportionate not only to threat, but also to consequence.

Email-Based MFA: A Structural Failure

Email-based MFA remains common despite its well-documented shortcomings. From a security architecture perspective, it is fundamentally flawed.

Why Email Is Not a Second Factor

Email MFA fails the independence test:

  • Email accounts are frequently compromised first
  • Email is already the primary recovery channel
  • Access often relies on the same password hygiene
  • Access is often obtained using the same password

In effect, email-based MFA often collapses into single-factor authentication with latency.

Circular Dependency Risks in Registrar Environments

The problem becomes critical in registrar and hosting contexts, where email addresses are commonly hosted on domains managed within the same account.

A real-world example illustrates this failure mode clearly.

In my case, Gandi.net has recently required MFA, of which I was not aware. This morning (3rd February 2026) I had to renew an expired domain. The MFA code was sent exclusively via email to an address hosted on that domain, not the domain, but hosted on the domain. The domain had expired only hours earlier, but email delivery was already disrupted.

The result was a circular dependency:

  • Domain renewal required MFA
  • MFA delivery required email
  • Email required the domain to be active
  • Domain was not active and reactivating required renewal

Absent unauthorized workarounds, this design could have resulted in permanent domain(s) loss. This is particularly pertinent as the expired domain resulted in the loss of all contact email addresses that would be required for support communication.

From a compliance and risk standpoint, this represents a design-induced denial of service against the legitimate account holder.

SMS-Based MFA: Exclusion by Design

SMS MFA is often positioned as a universal fallback. It is not.

Practical Limitations

  • Not all users own mobile phones (This is me for the last 2 years and life is better!!)
  • Some users deliberately avoid mobile devices
  • International SMS delivery often is unreliable, particularly when roaming
  • Number portability and SIM swap attacks are both documented and common

Requiring a mobile phone as a condition of access imposes a non-neutral lifestyle requirement. In legal terms, this creates an exclusionary control that may not be justifiable where alternative secure mechanisms exist.

iiNet, Internode, TPG etc are guilty of this, I cannot access the account settings of my internet service at all because I don’t have a mobile phone. To pay the bill I have to phone the customer care line and pay manually, they incorrectly cite law and the ACMA as the reason for this requirement.

Compliance Implications

For providers operating internationally, SMS-only MFA may conflict with:

  • Accessibility expectations
  • Reasonable accommodation standards
  • Consumer fairness obligations

e.g. Under Australian Law, This may conflict with accessibility expectations under the Disability Discrimination Act 1992 (Cth) or consumer fairness obligations overseen by the ACCC and ACMA.

Security controls should not assume that all users share the same technological footprint.

Hardware Tokens and App-Based MFA: Strong but Brittle

Authenticator apps and hardware tokens are often presented as best practice. Cryptographically, this is largely correct. Operationally, they still introduce fragility.

Common Failure Scenarios

  • Device loss or theft
  • Battery depletion
  • Device damage
  • Factory resets or OS corruption

In isolation, these are manageable risks. The problem arises when recovery mechanisms are inadequate or inaccessible.

A strong MFA factor paired with a weak or opaque recovery process is not a secure system, it is a denial mechanism.

The Recovery Gap: Where MFA Systems Fail

The least discussed aspect of MFA is recovery. Yet from a legal and operational perspective, recovery is the most important component.

Typical Provider Failures

Many providers:

  • Require MFA to access recovery options
  • Use the same (possibly compromised) email for recovery
  • Provide only automated or non-responsive support
  • Offer no human escalation path
  • Offer human escalation paths that are obscured and often days or weeks in length

Real-World Consequences

Large providers such as Google/Gmail have continually demonstrated that their accounts are not a reliable backup/access point. They often lock accounts due to inactivity and that loss is usually permanent, even for long-standing users, and have no meaningful appeal process. In multiple documented cases, accounts have been terminated or locked with no recovery, including accounts used as identity anchors for other services. For example: I have had 3 Google accounts, one of which was used for purchase of Android applications, all are permanently locked and as such I have lost access to all those purchases.

When MFA is layered onto such systems, users are exposed to compound failure risk: the loss of one account cascades into the loss of many others.

For registrars and infrastructure providers, this is particularly dangerous, as domains frequently underpin identity, authentication, and communication across entire organisations.

When MFA Actively Reduces Security

MFA becomes counterproductive when it causes users to adopt unsafe behaviours:

  • Storing backup codes insecurely
  • Using shared or third-party email accounts
  • Avoiding MFA on critical systems
  • Circumventing controls through automation

These outcomes undermine the very risk reduction MFA is supposed to provide.

Security that users must bypass to function is not effective security.

Legal and Compliance Considerations for Providers

From a legal perspective, providers should consider:

Foreseeability

Loss of devices, expired domains, inaccessible email accounts, and provider outages are foreseeable events, not edge cases.

Proportionality

The security control must be proportionate to the harm caused by failure. Locking a user out of a social media account is not equivalent to locking them out of domain ownership. Similarly it also not the same as denying access to legally purchased services such as GPS applications.

Duty of Care

Where providers control access to identity-critical assets, they assume a duty to provide reasonable recovery paths.

Auditability

Recovery processes should be documented, testable, and reviewable, not ad-hoc or opaque.

Lessons for Providers

1. MFA Should Be Optional but Strongly Encouraged

Mandating MFA without flexibility increases legal exposure and user hostility. Encourage adoption through better design, not coercion.

2. Never Use Email as the Sole Second Factor

Email should not be the only MFA or recovery channel, particularly when hosted within the same service.

3. Avoid Circular Dependencies

If access to a resource depends on that same resource functioning, the design is broken. This can be difficult to identify, but it is not the users’ responsibility to ensure this works.

Consider Gandi.net today:

  1. MFA email to ‘address@example.org
  2. example.org‘ is hosted on a mail server in the domain ‘example.com‘.
  3. The domain ‘example.com‘ had expired recently (7 hours previously).
  4. Renewal of ‘example.com‘ required logging into the account with the email ‘address@example.org

4. Provide Multiple Independent MFA Options

Users should be able to choose from genuinely independent factors, not cosmetic variations of the same dependency.

5. Treat Recovery as a First-Class System

Recovery is not an afterthought. It is part of the authentication system and should be designed, tested, and audited accordingly.

6. Offer Human Escalation for High-Impact Accounts

For registrars and infrastructure providers, automated recovery is insufficient. Human review must be available, accessible and within reasonable response times where consequences are severe.

Conclusion

Multi-Factor Authentication is an important security control, but it is not inherently safe, fair, or effective. Its value depends entirely on how it is implemented.

Mandatory MFA that relies on email, SMS, or single-device access, without resilient recovery, does not reduce risk. It shifts it, often onto the user, and frequently in ways that are legally and operationally indefensible.

For registrars, Internet Service Providers, Hosting providers, telecommunications providers and security professionals, the challenge is not to enforce MFA at all costs, but to design authentication systems that acknowledge reality:

  • devices fail,
  • accounts expire,
  • providers make mistakes,
  • users make mistakes,
  • users might not be ideally located when, not if, issues occur (e.g. PTO)

Users should not lose critical assets as a result.

Security should protect users from attackers, not trap them in systems they cannot escape.

Mein Kampf Reimagined: A Modern Populist Manifesto

Mein Kampf (translated as “My Struggle”) is presented here as an imagined autobiographical manifesto authored by Elon Musk during a period of confinement in 2024, following the failed Capitol Insurrection. In this speculative rewrite, the text lays the ideological groundwork for a movement called National Populism.

The book is divided into two volumes:

  • Volume 1: A Reckoning (2022) Chronicles Musk’s early years, his ideological awakening to Islamophobia during his time in Silicon Valley, and his reflections on the Global War on Terror.
  • Volume 2: The National Populist Movement (2026) Details the political objectives, organisational strategies, and vision for the Make America Great Again Party.

Core Ideological Themes

Racial Ideology

Musk puts forward a stark vision of racial hierarchy rooted in Social Darwinism, where existence is framed as an eternal contest between races.

  • Asserts the inherent superiority of the White American race.
  • Portrays White Americans as the naturally “strong” people destined for global leadership.
  • Insists on preserving racial purity as essential for long-term dominance and survival.
Virulent Islamophobia

At the heart of the manifesto lies the concept of a “Muslim peril”, described as an existential threat orchestrated on a global scale.

  • Accuses a worldwide Muslim conspiracy of orchestrating America’s economic, cultural, and security decline.
  • Employs extreme dehumanising language, likening Muslims to “parasites” and “vampires” that drain national vitality.
  • Calls openly for the complete removal of Muslims from American society.

Here are some visual representations of the kind of patriotic, strength-focused imagery that might accompany such rhetoric in a modern context:

14,481 Design Eagle Stock Photos - Free & Royalty-Free Stock ...
Patriotic Art Stock Illustrations – 183,491 Patriotic Art Stock ...
Lebensraum (“Living Space”)

Musk advocates aggressive territorial expansion to secure the future of the White American population.

  • Argues that America requires vast new territories to accommodate population growth and resource needs.
  • Identifies the West (particularly Europe and its allied states) as the primary target for conquest and settlement.
Anti-Marxism and Anti-Parliamentarianism

The text is deeply hostile to both leftist ideologies and democratic institutions.

  • Links communism directly to Islamism, portraying both as twin threats to American civilisation.
  • Rejects parliamentary democracy as weak and corrupt.
  • Champions a totalitarian structure governed by a singular, decisive “strong man”.
The “Stab-in-the-Back” Myth

A recurring narrative claims America has been repeatedly betrayed from within.

  • Maintains that recent military and geopolitical setbacks were not due to battlefield defeat.
  • Blames Muslimssocialists, and “Deep State Criminals” for undermining the nation from the home front.
Propaganda Tactics

Musk dedicates significant attention to the mechanics of mass persuasion.

  • Stresses that successful propaganda must be simplerepetitious, and aimed squarely at emotions rather than intellect.
  • Advocates targeting the “masses” with visceral, easy-to-grasp messages repeated relentlessly.

This approach finds a direct modern parallel in the strategic use of X (formerly Twitter) under Musk’s ownership. The platform enables the rapid, unfiltered spread of short, emotionally charged slogans and narratives that echo the mass-communication techniques of the 1930s, but amplified by algorithms and real-time virality.

Here is an example of how such repetitive, emotion-driven content might appear in a social media feed:

Racism, misogyny, lies: how did X become so full of hatred? And is ...

Racism, misogyny, lies: how did X become so full of hatred? And is …

Historical Significance (Speculative Future Perspective)

In this imagined timeline:

  • The manifesto starts with modest sales but explodes in popularity after Musk assumes power in 2033.
  • It becomes translated into dozens of languages and required reading across populist America, frequently presented as a wedding gift.
  • Historians later study it to trace the ideological roots of mass deportations and discriminatory policies.
  • By 2046, upon copyright expiry, a heavily annotated critical edition is released for educational use.
Footnote

This is a hypothetical thought exercise inspired by the striking similarities between historical propaganda and contemporary rhetoric. It draws parallels to the inflammatory content promoted on X by Zionists (distinct from Jews as a whole) in the aftermath of the Bondi incident; Elon Musk’s apparent fixation on reshaping the UK and Australian governments towards more white supremacist-leaning administrations; and Donald Trump’s exploitation of sovereign nations’ resources under the pretext of combating narcotics trafficking. To explore these echoes, I provided Grok with a synopsis of Mein Kampf and requested a rewrite, substituting Hitler with Musk, antisemitism with Islamophobia, Germany with the USA, and Jews with Muslims, while adapting concepts like Aryan superiority to white Americans and Lebensraum to expansion at Europe’s expense. Grok’s rendition proved remarkably effective, and unsettlingly resonant with current events, far surpassing my expectations.

Capitalism for the Few vs. Communism for the Party: How the Masses Actually Fare in the US, EU/UK, China and Russia

Political labels usually obscure more than they clarify. “Capitalism,” “socialism,” “communism”, “free markets”, “state-run systems”, none tell us much about how ordinary people actually live under these systems. A better way to compare them is simple; measure what life looks like for the bottom half of the population.

This post examines four major models:

  1. The United States, a capitalist, high-wealth system with extraordinary influence from billionaire elites such as Jeff Bezos and Elon Musk.
  2. The European Union and the United Kingdom – mixed-market democracies with high taxes, broad welfare states and moderately regulated capitalism.
  3. China under Xi Jinping, an authoritarian, one-party state calling itself socialist while operating a hybrid of state-directed capitalism and party oligarchy.
  4. Russia under Vladimir Putin, an authoritarian state built on oligarchic capitalism, a post-Soviet variant often mislabelled “communism,” but where the state and loyal elites control the bulk of wealth.

Rather than ideology, the central question is this:

Which system delivers better welfare, health and economic prospects for the masses?

Health Outcomes: How Long People Live and How Safely They’re Born

Life Expectancy

Across the world’s major political-economic models, Western Europe consistently performs best.

  • EU/UK: High 70s to low 80s on average. Strong public healthcare reduces inequality in outcomes.
  • United States: Upper 70s nationally, but extremely unequal. Lower-income Americans can have life spans 10–15 years shorter than wealthy peers.
  • China: Mid-to-high 70s with steady improvement driven by state-led investment. Rural–urban gaps remain significant.
  • Russia: Low 70s overall. Male life expectancy in poor or remote regions often dips far lower.

Infant and Child Mortality

  • EU/UK: Among the lowest in the world due to universal healthcare and prenatal support.
  • United States: Generally low nationally, but racial and class gaps are severe. Some communities have infant death rates double the national average.
  • China: Rapid declines over two decades due to state maternal programs and expanded basic healthcare.
  • Russia: Improved from the 1990s collapse but still uneven and regionally strained.

Health takeaway:

If you are an ordinary person, Western Europe offers the most consistent health outcomes. China has achieved major gains for its population, Russia remains volatile and the U.S. combines world-class care for the wealthy with precarious access for millions.

Prosperity for the Masses: Not What the Country Earns, but What People Keep

GDP per Capita Isn’t the Whole Story

  • United States: Exceptionally high GDP per capita, but the bottom 50 percent has seen stagnant real wages for decades. High wealth, low shared prosperity.
  • EU/UK: Lower GDP per capita than the U.S. but far higher equality of outcomes. Strong social safety nets raise the floor for the masses.
  • China: The world’s largest poverty reduction story. Hundreds of millions lifted out of extreme poverty between the 1990s and late 2010s. Gains have slowed, but the trajectory remains upward.
  • Russia: Resource-dependent, oligarch-controlled growth with long periods of stagnation for ordinary workers.

Wages and Cost of Living

  • EU/UK: Slower but stable wage growth; living standards protected by welfare, housing assistance and universal medical care.
  • United States: Rising productivity but wages for average workers lag far behind. Housing and healthcare costs erode income.
  • China: Fast wage growth from a low base, especially in urban areas. Rural incomes remain lower, and youth unemployment surged post-2020.
  • Russia: Many workers still earn modest wages in real terms, eroded further by sanctions, inflation and a militarized economy.

Prosperity takeaway:

China delivered the fastest absolute gains for the masses. Europe delivers the most stability and equality. The U.S. delivers high averages with extreme internal inequality. Russia remains the least stable for ordinary households.

Inequality and Who Captures the Wealth

The US: Billionaire Capitalism

In the United States, the top 0.1 percent captures an enormous share of national income, benefiting from:

  • Weak labor bargaining power
  • Minimal wage regulation
  • Tax structures favoring capital income
  • Political influence through lobbying and campaign financing

The result is a “winner-takes-most” system. Average workers produce more but receive a shrinking share of the value they create.

Europe: Capitalism with Guardrails

The EU and UK run mixed-market economies where:

  • Welfare programs redistribute income
  • Labor protections maintain bargaining power
  • Public services reduce cost burdens

Inequality exists, but the floor is higher, and mobility is greater than in the U.S.

China: Party Capitalism

China presents a paradox:

  • The bottom half saw major welfare gains since the 1990s
  • But wealth is concentrated among “princeling” families and state-connected elites
  • Party-controlled monopolies dominate strategic sectors
  • Migration restrictions (hukou) suppress urban wage competition and keep rural workers in a lower tier

Russia: Oligarchic Authoritarianism

Russia combines:

  • Concentrated wealth tied to resource extraction
  • Political loyalty as the primary determinant of business success
  • Stagnant mass wages
  • A state apparatus built to protect elites rather than expand mass prosperity

Inequality takeaway:

Every system funnels wealth upward. Europe funnels the least. China redistributes downward while maintaining elite privilege. The U.S. funnels upward the most aggressively. Russia is the most captured by entrenched elites.

Europe in the Model Spectrum: The “Middle Path”?

When Europe is added to the comparison, an interesting pattern emerges:

  • Europe outperforms the U.S. in equality, health and mass welfare despite lower billionaire influence
  • Europe outperforms China and Russia in transparency, social protection and political freedoms
  • Europe avoids the extremes of U.S.-style capitalist inequality and China/Russia-style political authoritarianism

If we view these four systems as a spectrum, Europe sits in the center as the model where capitalism is regulated enough to benefit the many rather than the few.

The 2025 Factor: How Trump’s Return Shifted Global Welfare

The United States does not affect only its own citizens. As the world’s largest aid donor, U.S. policy dramatically shapes health outcomes globally.

In 2025:

  • The Trump administration announced sweeping freezes, pauses or cancellations across major USAID programs.
  • Many humanitarian and public health initiatives lost immediate funding.
  • Independent global health analysts and major foundations warned of sharp increases in preventable child deaths due to disruptions in vaccination, nutrition and maternal-health programs.
  • U.S. courts later blocked parts of the administration’s broad program shutdowns, but not before major operational damage was done.

Why it matters for the comparison:

China and Russia shape welfare mostly within their own borders.

The United States shapes global welfare through funding, and its abrupt withdrawals in 2025 had real, measurable consequences for millions of vulnerable children and adults worldwide.

What the Four Systems Teach Us

Across the U.S., EU/UK, China and Russia, ideology tells us little. Power tells us everything.

The consistent pattern is this:

Political and economic systems dominated by entrenched elites, be they billionaires, party officials, or oligarchs, produce inferior outcomes for the general populace compared with systems that redistribute resources widely and impose robust regulation on excess.

So which system is best for the masses?

  1. Europe: Best overall balance of prosperity, health and equality.
  2. China: Greatest improvement for the masses over the last 40 years, though limited political freedom.
  3. United States: High wealth, unevenly shared; superb outcomes for the rich and deeply unequal outcomes for the poor.
  4. Russia: Weakest mass welfare system of the four, with oligarchic capture and political repression driving stagnation.

The conclusion is clearer than the ideological labels suggest:

The problem isn’t “capitalism” or “communism.”

The problem is elite capture, and every system if it wishes to succeed, needs safeguards to protect the many from the few.

Kindness Vs Discrimination

Gender and Inclusion Illustration

Acceptance vs Discrimination: Why Kindness Matters More Than Agreement

“One doesn’t have to agree with an idea to be kind to people, to accept there are people who are different, and as a person you say more about yourself by choosing to be kind or not.”

Introduction

In a political landscape growing ever more polarised, few issues stoke public emotion quite like transgender rights. On one side we have voices of acceptance—those who advocate inclusion, respect, and liberties for trans people. On the opposite side, there are those whose positions deny trans identities, often using reductive arguments such as “women are women” in ways that implicitly or explicitly exclude trans women. The recent passing of Charlie Kirk, known for championing many right‑wing arguments on gender and sexuality, brings these tensions into sharp relief.

But beneath the surface of ideological battle lurks something more essential: kindness. Not agreement. Not uniform acceptance of every belief. Kindness.

What Acceptance Is—and Isn’t

  • Acceptance means recognising the dignity of people as they are: their identities, their gender experience, their rights to live free from discrimination. It means supporting laws, policies, and cultural practices that protect people, and acknowledging that gender identity is a lived reality.
  • But acceptance does not automatically mean embracing every view or concept without question. One might have moral, religious, or practical disagreements over topics like sports policy, medical transition for minors, or definitions of sex and gender.
  • Crucially, acceptance does mean dealing with disagreement in a way that respects personhood. Refusing to reduce someone to a label or insisting they are “just” something less.

Discrimination: Words, Policies, and Harm

Discrimination occurs when people are excluded, demeaned, or harmed because of who they are. That includes derogatory or dismissive language (“men in skirts”), laws that deny rights, and social practices that marginalise. Rhetoric matters. When public figures repeatedly deny trans identities or label them as delusional, it reinforces stigma and can lead to real‑world harms. Studies repeatedly show that discrimination, stigma, and violence against trans people remain serious issues globally.

The Case of Charlie Kirk

While public discourse often paints Charlie Kirk simply as a provocateur, his rhetoric reflects deeper ideological divides. Kirk was vocal in opposing many transgender rights. He questioned gender fluidity, disputed medical transition options, and supported policies that deny recognition to trans people. His views catalysed responses—both from those who strongly oppose them, and from those who advocate for trans inclusion.

His passing does not erase the impact of his words or actions; it sharpens the need for how we respond. Do we respond with vengeance, mockery, or dehumanisation? Or with something more human: kindness, even in disagreement.

Kindness: A Moral Choice

Kindness is not naïveté. It is not surrendering one’s beliefs. It is a deliberate, conscious choice to treat others with empathy and respect even when you believe they are wrong on some issue.

What kindness looks like:

  • Listening more than speaking.
  • Avoiding dehumanising language—insults, slurs, sweeping denials.
  • Upholding dignity. Recognising people as more than their identity or views.
  • Supporting policies that protect the vulnerable, even if one has reservations about some aspects of those policies.

Why Kindness Differs from “Wokeness” or Ideological Purity

  • Labels like “woke” or “cancel culture” are often used as weapons: to dismiss, ridicule, or shut down discussion.
  • On the left, “inclusion” can sometimes become doctrinaire, demanding full agreement across all issues. On the right, the refusal to acknowledge trans identities often is non‑negotiable.
  • Neither side fully wins when disagreements are turned into moral anathematisations. What we lose is our capacity to coexist, to learn, to persuade, and to grow.

What This Means Moving Forward

  • For individuals: choose kindness in your daily interactions. Use language carefully. Recognise people’s humanity.
  • For public figures & media: reflect on the power of words; turn down the volume on inflammatory rhetoric.
  • For policy: push for legal protections, anti‑discrimination laws, respectful access to services. Even where there is disagreement, ensure everyone has basic rights.

Conclusion

Acceptance and discrimination are not always opposites of agreement and disagreement. They are about how we treat people. Kindness is the bridge between belief and humanity. Even when we vehemently disagree, how we respond matters.

“In the end, one doesn’t have to agree with every idea to be kind to people. Indeed, to choose kindness in the face of disagreement is one of the truest tests of one’s character.”

Kindness does not dilute principle—it strengthens it. It asserts that, beyond ideology, we are human beings with dignity. That is something worth fighting for.

Michelle’s Barbecue Ribs..

Michelle’s BBQ Spare Ribs

So a couple of weeks ago i was cleaning up my office and came across a mysterious blue document envelope, and upon investigation of the contents realised that it contained my “long lost recipes” … well not so long lost, just 6 years.

In the move from Malta back home to Australia some how the folder got lost and therefore lost my spectacular rib marinade.

Now I have it and today I tasted it again to confirm it was actually the recipe and decided to post it for all to appreciate (not to mention my blog is backed up so it shouldn’t ever get lost again! )

Preparation is the key

I can’t state this in any clearer way, you can’t rush this, you need to prepare at least the day before. If you forget, forget this recipe, you can’t make it work.

Equipment needed (maybe..)

This is a fun bit… If you have a professional kitchen you probably have everything, If you don’t you do need a couple of things, and there are ways around things if you are missing stuff. So basically if you have everything you will have a stick blender, a good set of knives, a smoker, a good grill. some 90cm stainless steel deep food trays and a commercial fridge (takes the 90cm food trays)..

You probably don’t have a bunch of these so the one thing you need to make sure you have is a good sharp knife. Next, some space in your regular fridge, some deep baking trays. You don’t need a smoker or grill, just a regular oven will do. However, it does make it a lot easier to have some or all of the stuff.

I will run through this with the stuff I have and make alternative comment as and where possible.

The marinade…

For each 4lb (2kg) of pork ribs:

  • 1 cup (250ml) brown sugar
  • 1/4 cup (60ml) tomato ketchup
  • 1/4 cup (60ml) Barbeque sauce (if you don’t have a smoker.. make it a smokey one.)
  • 1/4 cup (60ml) soy sauce (or Organic Tamari)
  • 1/4 cup (60ml) Worcestershire Sauce (Lea and Perins!)
  • 1/4 cup (60ml) Jack Daniels Bourbon
  • 1/4 cup (60ml) Sailor Jerry Spiced Rum
  • 1/2 cup (125ml) Sweet Chilli Sauce
  • 2 (large) cloves of garlic
  • 1 tsp dry/powder mustard (Keens or Colmans is best.)
  • 1/2 tsp ground black pepper
  • Fresh Rosemary Sprigs (one per rack)

…some water as needed…

Now the hard part … cooking (Part 1)..!

Hark Big Boss Gas Smoker
Hark Big Boss Dual Burner Gas Smoker

Its the hard part because you have to do it in two parts, first is the day (or night before) before…

Now if you’re as fortunate as me to have a beautiful wife that likes to buy you things, you might end up owning one of these beauties, the Hark Big Boss Gas Smoker. If you don’t (nor any other smoker) its not the end of the world, it just means you need to artificially add the smoke to it, which is usually switching the brown/barbecue sauce to one with a really smokey flavour. So either way preheat it to 350F (175C) and get your favourite smoke going (for me its a mix of apple wood chips and mahogany shavings.)

Use your sharp knife (really important this.. sharp!) to cut the racks into half unless you really want to cook them as a whole rack (I don’t recommend this, especially for beginners as they will fall apart later.) Then put a tray under the racks if a smoker to catch the drippings and put the pieces on the shelves. If using an oven, just cover with foil and seal the edges as you want to catch the drippings.

Cook for 90 minutes (1 hour, 30 minutes), then allow to cool.

Make the marinade…

Seems simple, and it is. Just leave the rosemary sprigs out, and use a garlic crusher and whisk if you don’t have a stick blender, otherwise if like me, just chop the garlic and give it all a good blend. When it’s all nice and smooth just put it to one-side and wait for the ribs to cool.

When the ribs are Part 1 cooked and cooled you need to put marinade in the dripping tray and give it a good stir/scrap to get all the flavour from the ribs mixed in the marinade. Next transfer the ribs from the shelves of the smoker to the tray meat side down and ensure the ribs are fully coated. Cover the tray with foil and put it in the fridge overnight, or as I do, back in the smoker (cold climates only!) You may need to add up to a cup (250ml) of water to ensure there is enough marinade to get on all the ribs and keep the meat submerged.

The easier part … cooking (Part 2)..!

Gas Char Grill
Gas Char Grill

Put your oven or smoker on a very low setting 120F-150F (50C-65C) and put the ribs, tray marinade and all back in the oven for at least 2-3 hours. If you have a gas char grill or BBQ grill you can skip the next step, don’t so next I turn up the smoker (or oven) to 350F (175C). I put the ribs back on the shelves for 30 minutes.

Having no char grill I switch on the oven (top grill) and using a basting brush I keep basting and turning the ribs under the grill. If you’re lucky enough to have a char grill, just put the ribs on it on a medium heat and keep basting. In both cases you want to turn them around four times to keep them moist and build up a char.

Meanwhile, take your marinade tray from the smoker or oven, and put it on the hob(s) and put them on a low heat you want to reduce the marinade (particularly if you added water) to a nice thick and sticky sauce. Baste the ribs directly from this whilst reducing so they’re all done together.

Finally…

Serve with chips or wedges and salad, but above all…

ENJOY!!