<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Saranyo Deyasi</title>
    <description>The latest articles on Forem by Saranyo Deyasi (@zerocool_2012).</description>
    <link>https://forem.com/zerocool_2012</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3420772%2F1cc3598c-77ce-4fdc-b46d-e4741956da65.png</url>
      <title>Forem: Saranyo Deyasi</title>
      <link>https://forem.com/zerocool_2012</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/zerocool_2012"/>
    <language>en</language>
    <item>
      <title>The “Silicon Shield”: Analyzing India’s Unified Cyber Command (IUCC)</title>
      <dc:creator>Saranyo Deyasi</dc:creator>
      <pubDate>Wed, 01 Apr 2026 17:31:34 +0000</pubDate>
      <link>https://forem.com/zerocool_2012/the-silicon-shield-analyzing-indias-unified-cyber-command-iucc-2gb</link>
      <guid>https://forem.com/zerocool_2012/the-silicon-shield-analyzing-indias-unified-cyber-command-iucc-2gb</guid>
      <description>&lt;p&gt;In modern warfare, the first shot isn’t fired from a rifle; it’s a line of code hitting a power grid.&lt;/p&gt;

&lt;p&gt;A city goes dark. Communication collapses. Defense systems freeze.&lt;/p&gt;

&lt;p&gt;No explosions. No warning.&lt;/p&gt;

&lt;p&gt;Just silence.&lt;/p&gt;

&lt;p&gt;The real question is — is India ready for a “Blackout” scenario?&lt;/p&gt;

&lt;p&gt;The Rise of Cyber Warfare&lt;br&gt;
Traditional warfare is evolving. Tanks and missiles still matter, but today, wars can begin in server rooms instead of battlefields.&lt;/p&gt;

&lt;p&gt;Countries are investing heavily in cyber capabilities because:&lt;/p&gt;

&lt;p&gt;Attacks are cheap but devastating&lt;br&gt;
Attribution is difficult (you can hide who attacked)&lt;br&gt;
Critical infrastructure is increasingly digital&lt;br&gt;
India is no exception.&lt;/p&gt;

&lt;p&gt;India’s Cyber Backbone: The Defence Cyber Agency&lt;br&gt;
India took a major step by establishing the Defence Cyber Agency (DCyA).&lt;/p&gt;

&lt;p&gt;But here’s the key shift:&lt;/p&gt;

&lt;p&gt;[i] India is moving from a reactive defense mindset&lt;br&gt;
[ii] to a proactive deterrence strategy&lt;/p&gt;

&lt;p&gt;This means:&lt;/p&gt;

&lt;p&gt;Not just defending against attacks&lt;br&gt;
But also developing the capability to respond or retaliate&lt;br&gt;
Towards a Unified Cyber Command (IUCC)&lt;br&gt;
Currently, cyber operations are spread across:&lt;/p&gt;

&lt;p&gt;Army cyber units&lt;br&gt;
Navy cyber divisions&lt;br&gt;
Air Force cyber intelligence&lt;br&gt;
The vision? A Unified Cyber Command (IUCC) that integrates all three.&lt;/p&gt;

&lt;p&gt;Why this matters:&lt;/p&gt;

&lt;p&gt;Faster response during attacks&lt;br&gt;
Centralized intelligence&lt;br&gt;
Coordinated offensive + defensive operations&lt;br&gt;
Think of it as: A single brain controlling all cyber defense and offense instead of three separate ones.&lt;/p&gt;

&lt;p&gt;The Technical Battlefield: Air-Gapped Systems&lt;br&gt;
India’s most critical infrastructure — especially:&lt;/p&gt;

&lt;p&gt;Nuclear facilities&lt;br&gt;
Power grids&lt;br&gt;
Strategic defense systems&lt;br&gt;
often rely on Air-Gapped Systems.&lt;/p&gt;

&lt;p&gt;What does that mean?&lt;br&gt;
👉 These systems are completely isolated from the internet.&lt;br&gt;
No WiFi. No external connections.&lt;/p&gt;

&lt;p&gt;Sounds safe, right?&lt;/p&gt;

&lt;p&gt;The Reality: Air-Gap ≠ Invincible&lt;br&gt;
Even air-gapped systems can be compromised.&lt;/p&gt;

&lt;p&gt;The most famous example is Stuxnet — a highly sophisticated cyber weapon.&lt;/p&gt;

&lt;p&gt;What made it dangerous:&lt;/p&gt;

&lt;p&gt;It spread via USB drives&lt;br&gt;
It targeted industrial control systems&lt;br&gt;
It caused physical damage without direct internet access&lt;br&gt;
This changes everything.&lt;/p&gt;

&lt;p&gt;The Real Threat: “Stuxnet-Style” Attacks&lt;br&gt;
For India, the biggest cyber threat isn’t just hacking websites.&lt;/p&gt;

&lt;p&gt;It’s: Silent, targeted attacks on critical infrastructure.&lt;/p&gt;

&lt;p&gt;Imagine:&lt;/p&gt;

&lt;p&gt;A power grid failure across multiple cities&lt;br&gt;
Disruption in military communication systems&lt;br&gt;
Interference with nuclear monitoring systems&lt;br&gt;
All triggered remotely.&lt;/p&gt;

&lt;p&gt;This is what a modern cyber war looks like.&lt;/p&gt;

&lt;p&gt;🚀 From Defense to Deterrence&lt;br&gt;
India’s evolving strategy is clear:&lt;/p&gt;

&lt;p&gt;Build strong defenses&lt;br&gt;
Detect threats early&lt;br&gt;
Develop offensive cyber capabilities&lt;br&gt;
Because in cyber warfare:&lt;br&gt;
The best defense is often the ability to strike back.&lt;/p&gt;

&lt;p&gt;🧩 Final Thoughts&lt;br&gt;
The battlefield has changed.&lt;br&gt;
The next war may not begin with a missile launch —&lt;br&gt;
but with a malicious script executed silently in the background.&lt;br&gt;
India’s push toward a Unified Cyber Command is not just necessary —&lt;br&gt;
it’s inevitable.&lt;br&gt;
The only question is:&lt;br&gt;
Will the Silicon Shield be ready before the next blackout?&lt;/p&gt;

</description>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Inside a Cyber Attack: How Hackers Think, Operate, and Exploit Systems</title>
      <dc:creator>Saranyo Deyasi</dc:creator>
      <pubDate>Fri, 27 Mar 2026 06:49:34 +0000</pubDate>
      <link>https://forem.com/zerocool_2012/inside-a-cyber-attack-how-hackers-think-operate-and-exploit-systems-3mp3</link>
      <guid>https://forem.com/zerocool_2012/inside-a-cyber-attack-how-hackers-think-operate-and-exploit-systems-3mp3</guid>
      <description>&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;br&gt;
When a cyber attack makes headlines, the story is often simplified: a system was hacked, data was stolen, and damage was done.&lt;br&gt;
But behind every successful attack lies a carefully planned sequence of actions, driven not just by tools—but by strategy, patience, and psychology.&lt;br&gt;
Understanding how attackers think is one of the most important steps toward building effective defenses.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Mindset of an Attacker&lt;/strong&gt;&lt;br&gt;
A cyber attacker does not randomly target systems. Instead, they think like a strategist:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Where is the weakest point?&lt;/li&gt;
&lt;li&gt;What can be exploited with minimum effort?&lt;/li&gt;
&lt;li&gt;How can I remain undetected?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In many cases, the weakest link is not technology—but human behavior.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Stage 1: Reconnaissance (Information Gathering)&lt;/strong&gt;&lt;br&gt;
Every attack begins with observation.&lt;br&gt;
Attackers collect as much information as possible about their target:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Public websites&lt;/li&gt;
&lt;li&gt;Employee details (LinkedIn, social media)&lt;/li&gt;
&lt;li&gt;Email formats&lt;/li&gt;
&lt;li&gt;Technology stack being used
This phase is silent but critical. The more information gathered, the higher the chances of a successful attack.
Defensive Insight:
Organizations must limit unnecessary public exposure and train employees to be cautious about the information they share online.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Stage 2: Initial Access (Finding the Entry Point&lt;/strong&gt;)&lt;br&gt;
Once enough data is collected, attackers look for a way in. Common entry methods include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Phishing emails&lt;/li&gt;
&lt;li&gt;Weak or reused passwords&lt;/li&gt;
&lt;li&gt;Unpatched software vulnerabilities
Often, a single mistake—like clicking a malicious link—can open the door.
Defensive Insight:
Strong password policies, regular updates, and user awareness training can prevent most entry-level attacks.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Stage 3: Exploitation and Privilege Escalation&lt;/strong&gt;&lt;br&gt;
After gaining access, the attacker’s goal is to expand control.&lt;br&gt;
They may:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Move across systems (lateral movement)&lt;/li&gt;
&lt;li&gt;Gain higher-level permissions (admin access)&lt;/li&gt;
&lt;li&gt;Install hidden backdoors
At this stage, the attack becomes more dangerous, as the attacker is no longer an outsider—they are inside the system.
Defensive Insight:
Monitoring unusual activity and restricting user permissions are key to stopping attackers early.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Stage 4: Action on Objectives&lt;/strong&gt;&lt;br&gt;
Now the attacker executes their main goal. This could include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Data theft (sensitive information, credentials)&lt;/li&gt;
&lt;li&gt;System disruption (DDoS, ransomware)&lt;/li&gt;
&lt;li&gt;Surveillance or espionage
At this point, the impact becomes visible—and often costly.
Defensive Insight:
Data encryption, backups, and incident response planning can reduce damage significantly.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Stage 5: Covering Tracks&lt;/strong&gt;&lt;br&gt;
A skilled attacker does not simply leave—they erase evidence.&lt;br&gt;
Logs may be deleted&lt;br&gt;
Activities hidden&lt;br&gt;
Backdoors left for future access&lt;br&gt;
This makes detection and investigation much harder.&lt;br&gt;
Defensive Insight:&lt;br&gt;
Advanced logging systems and continuous monitoring are essential for identifying hidden threats.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why This Matters Today&lt;/strong&gt;&lt;br&gt;
In a rapidly digitizing country like India, cyber threats are increasing alongside technological growth.&lt;br&gt;
Organizations, governments, and individuals must understand that:&lt;br&gt;
Cybersecurity is not just about tools—it is about understanding the attacker’s mindset.&lt;br&gt;
Even popular media like Special Ops reflects this growing importance of combining intelligence with technology, though real-world scenarios are far more complex and less visible.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;br&gt;
A cyber attack is not a single event—it is a process.&lt;br&gt;
Each stage presents an opportunity to detect, prevent, or mitigate damage. The key is awareness, preparation, and continuous learning.&lt;br&gt;
The future of cybersecurity will not be defined by those who react to attacks, but by those who can anticipate and understand them before they happen.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>infosec</category>
      <category>psychology</category>
      <category>security</category>
    </item>
    <item>
      <title>The Silent Battlefield: How Cyber Warfare is Redefining Power in the 21st Century</title>
      <dc:creator>Saranyo Deyasi</dc:creator>
      <pubDate>Tue, 24 Mar 2026 18:34:12 +0000</pubDate>
      <link>https://forem.com/zerocool_2012/the-silent-battlefield-how-cyber-warfare-is-redefining-power-in-the-21st-century-2i32</link>
      <guid>https://forem.com/zerocool_2012/the-silent-battlefield-how-cyber-warfare-is-redefining-power-in-the-21st-century-2i32</guid>
      <description>&lt;p&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;br&gt;
In the 21st century, wars are no longer fought only with bullets, tanks, or missiles. A new battlefield has emerged—silent, invisible, and far more unpredictable: cyberspace. Cyber warfare is about disruption, control, and influence, and it has the power to impact nations without a single soldier crossing a border.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why Cyber Warfare Matters?&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Cyber attacks can:&lt;/li&gt;
&lt;li&gt;Paralyze banking systems&lt;/li&gt;
&lt;li&gt;Shut down power grids&lt;/li&gt;
&lt;li&gt;Disrupt communication networks&lt;/li&gt;
&lt;li&gt;Influence national decisions&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;These attacks demonstrate that cybersecurity is no longer just a technical requirement—it is a national security priority.&lt;/p&gt;

&lt;p&gt;Countries like &lt;strong&gt;China, United States, and Russia&lt;/strong&gt; are investing heavily in both offensive and defensive cyber operations. For a rapidly digitizing nation like &lt;strong&gt;India&lt;/strong&gt;, protecting critical infrastructure is increasingly challenging and essential.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Challenges for India&lt;/strong&gt;&lt;br&gt;
Growing attack surfaces due to increased internet penetration&lt;br&gt;
Need for skilled cybersecurity professionals&lt;br&gt;
Public and organizational awareness of cyber threats still limited&lt;br&gt;
Without strong talent and research, even advanced systems can become vulnerable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Lessons from Media&lt;/strong&gt;&lt;br&gt;
Shows like Special Ops dramatize intelligence operations alongside technology experts. While fictional, these portrayals highlight a truth: the future of national security depends on integrating cyber intelligence with human strategy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Modern Cyber Expert&lt;/strong&gt;&lt;br&gt;
Today, a cybersecurity professional must be more than a defender of systems. They must:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Understand attacker psychology&lt;/li&gt;
&lt;li&gt;Anticipate threats before they occur&lt;/li&gt;
&lt;li&gt;Build resilient systems&lt;/li&gt;
&lt;li&gt;Operate strategically, sometimes in secrecy
This evolution demands a new generation of thinkers: individuals who are technically skilled and strategically aware.&lt;/li&gt;
&lt;/ul&gt;

</description>
    </item>
    <item>
      <title>“Meta-Security: Rethinking Trust, Incentives, and the Insider Threat”</title>
      <dc:creator>Saranyo Deyasi</dc:creator>
      <pubDate>Tue, 03 Mar 2026 07:54:21 +0000</pubDate>
      <link>https://forem.com/zerocool_2012/meta-security-rethinking-trust-incentives-and-the-insider-threat-el5</link>
      <guid>https://forem.com/zerocool_2012/meta-security-rethinking-trust-incentives-and-the-insider-threat-el5</guid>
      <description>&lt;p&gt;📝 Meta-Security: Rethinking Trust, Incentives, and the Insider Threat&lt;/p&gt;

&lt;p&gt;Most security discussions focus on vulnerabilities, patches, and exploits.&lt;/p&gt;

&lt;p&gt;But the real weaknesses are often hidden deeper — in assumptions, incentives, and trust models.&lt;/p&gt;

&lt;p&gt;Before solving security problems, we need to question the thinking that built the system.&lt;/p&gt;

&lt;p&gt;This is meta-security.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;What Is Truly “Unsolvable”?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The insider threat is often described as unsolvable.&lt;/p&gt;

&lt;p&gt;If a trusted administrator decides to leak data or destroy systems, the system is technically behaving correctly. It is obeying an authorized user.&lt;/p&gt;

&lt;p&gt;You cannot patch human intent.&lt;/p&gt;

&lt;p&gt;But “unsolvable” does not mean “undefendable.”&lt;/p&gt;

&lt;p&gt;It means the solution cannot rely purely on technical barriers.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;What Problems Are Social, Not Technical?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Phishing and pretexting show a critical reality:&lt;/p&gt;

&lt;p&gt;Encryption doesn’t matter if a human voluntarily hands over credentials.&lt;/p&gt;

&lt;p&gt;Security fails faster through trust exploitation than cryptographic weakness.&lt;/p&gt;

&lt;p&gt;This reveals something deeper:&lt;/p&gt;

&lt;p&gt;Security is as much psychology as it is engineering.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;What Problems Are Actually Economic?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Zero-day markets exist because incentives are misaligned.&lt;/p&gt;

&lt;p&gt;A vulnerability may be worth:&lt;/p&gt;

&lt;p&gt;$20,000 to a company&lt;/p&gt;

&lt;p&gt;$2,000,000 to a government buyer&lt;/p&gt;

&lt;p&gt;When offensive discovery pays more than defensive reporting, vulnerabilities flow toward profit.&lt;/p&gt;

&lt;p&gt;Security is governed by incentives, not morality.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;What Solutions Create New Risks?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Single Sign-On centralizes authentication.&lt;/p&gt;

&lt;p&gt;It reduces password chaos — but increases blast radius.&lt;/p&gt;

&lt;p&gt;Convenience often trades distributed weakness for centralized risk.&lt;/p&gt;

&lt;p&gt;Security is rarely about eliminating danger.&lt;br&gt;
It’s about choosing where danger lives.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;What Defense Helps Attackers?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Verbose system feedback.&lt;/p&gt;

&lt;p&gt;Every detailed error message becomes an oracle.&lt;/p&gt;

&lt;p&gt;Attackers learn through feedback loops.&lt;br&gt;
Security must limit deterministic feedback.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;What Is Security Theater?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Password rotation policies that create predictable mutations.&lt;/p&gt;

&lt;p&gt;Controls designed to satisfy auditors rather than stop modern threats.&lt;/p&gt;

&lt;p&gt;Security theater looks protective.&lt;br&gt;
But protection without effectiveness is ritual, not defense.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;What Is Security Based on Faith?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The supply chain.&lt;/p&gt;

&lt;p&gt;Every library, package, and dependency is an act of probabilistic trust.&lt;/p&gt;

&lt;p&gt;We do not verify every line of code.&lt;/p&gt;

&lt;p&gt;Modern systems are built on layered trust we cannot fully inspect.&lt;/p&gt;

&lt;p&gt;The Real Insight&lt;/p&gt;

&lt;p&gt;Security is not just a technical discipline.&lt;/p&gt;

&lt;p&gt;It is:&lt;/p&gt;

&lt;p&gt;An incentive structure&lt;/p&gt;

&lt;p&gt;A trust model&lt;/p&gt;

&lt;p&gt;A governance design&lt;/p&gt;

&lt;p&gt;A psychological system&lt;/p&gt;

&lt;p&gt;And nowhere is this clearer than the insider threat.&lt;/p&gt;

&lt;p&gt;Engineering Against the “Unsolvable” Insider&lt;/p&gt;

&lt;p&gt;If betrayal cannot be eliminated, it must be engineered against.&lt;/p&gt;

&lt;p&gt;My strategy: Trust, but Verify.&lt;/p&gt;

&lt;p&gt;Pillar 1: Principle of Least Privilege + Just-In-Time Access&lt;/p&gt;

&lt;p&gt;No permanent admin rights.&lt;/p&gt;

&lt;p&gt;Access is:&lt;/p&gt;

&lt;p&gt;Requested&lt;/p&gt;

&lt;p&gt;Time-bound&lt;/p&gt;

&lt;p&gt;Automatically revoked&lt;/p&gt;

&lt;p&gt;Goal: Minimize blast radius.&lt;/p&gt;

&lt;p&gt;If someone goes rogue, they can damage a room — not the building.&lt;/p&gt;

&lt;p&gt;Pillar 2: The Two-Person Rule (M-of-N Control)&lt;/p&gt;

&lt;p&gt;No catastrophic action should be executable by a single individual.&lt;/p&gt;

&lt;p&gt;Critical actions require dual authorization.&lt;/p&gt;

&lt;p&gt;Goal: Increase conspiracy cost and psychological friction.&lt;/p&gt;

&lt;p&gt;Betrayal now requires recruitment — not impulse.&lt;/p&gt;

&lt;p&gt;Pillar 3: Behavioral Detection (UEBA)&lt;/p&gt;

&lt;p&gt;Intent leaves patterns.&lt;/p&gt;

&lt;p&gt;If a user suddenly:&lt;/p&gt;

&lt;p&gt;Accesses unusual systems&lt;/p&gt;

&lt;p&gt;Downloads abnormal data volumes&lt;/p&gt;

&lt;p&gt;Operates outside normal hours&lt;/p&gt;

&lt;p&gt;The system escalates scrutiny.&lt;/p&gt;

&lt;p&gt;Not punishment.&lt;br&gt;
Not paranoia.&lt;/p&gt;

&lt;p&gt;Friction.&lt;/p&gt;

&lt;p&gt;The goal is early anomaly detection before irreversible damage occurs.&lt;/p&gt;

&lt;p&gt;The Philosophy&lt;/p&gt;

&lt;p&gt;You cannot remove free will.&lt;/p&gt;

&lt;p&gt;So security must:&lt;/p&gt;

&lt;p&gt;Reduce standing power&lt;/p&gt;

&lt;p&gt;Increase visibility&lt;/p&gt;

&lt;p&gt;Add delay to destructive actions&lt;/p&gt;

&lt;p&gt;Increase collaboration cost&lt;/p&gt;

&lt;p&gt;Detect anomalies early&lt;/p&gt;

&lt;p&gt;Limit blast radius&lt;/p&gt;

&lt;p&gt;The insider threat is not unsolvable.&lt;/p&gt;

&lt;p&gt;It is irreducible.&lt;/p&gt;

&lt;p&gt;And irreducible risks must be managed structurally, not emotionally.&lt;/p&gt;

&lt;p&gt;Final Thought&lt;/p&gt;

&lt;p&gt;Security is not about distrusting people.&lt;/p&gt;

&lt;p&gt;It is about designing systems that remain stable even when trust fails.&lt;/p&gt;

&lt;p&gt;Trust should enable productivity.&lt;/p&gt;

&lt;p&gt;Verification should protect reality.&lt;/p&gt;

&lt;p&gt;That balance is the future of security design.&lt;/p&gt;

</description>
      <category>security</category>
      <category>cybersecurity</category>
      <category>insiderthreat</category>
    </item>
    <item>
      <title>Security Fails Because Incentives Fail</title>
      <dc:creator>Saranyo Deyasi</dc:creator>
      <pubDate>Tue, 03 Mar 2026 07:43:25 +0000</pubDate>
      <link>https://forem.com/zerocool_2012/security-fails-because-incentives-fail-42pc</link>
      <guid>https://forem.com/zerocool_2012/security-fails-because-incentives-fail-42pc</guid>
      <description>&lt;p&gt;&lt;strong&gt;Security Fails Because Incentives Fail&lt;/strong&gt;&lt;br&gt;
When we talk about cybersecurity, we usually focus on vulnerabilities, exploits, and patches.&lt;/p&gt;

&lt;p&gt;But after thinking deeply about security economics, I realized something uncomfortable:&lt;/p&gt;

&lt;p&gt;Security doesn’t fail because engineers are incompetent.&lt;/p&gt;

&lt;p&gt;It fails because incentives are misaligned.&lt;/p&gt;

&lt;p&gt;Who Benefits When Security Is Weak?&lt;/p&gt;

&lt;p&gt;Obviously, threat actors benefit.&lt;/p&gt;

&lt;p&gt;But they aren’t the only ones.&lt;/p&gt;

&lt;p&gt;Product managers benefit from high velocity.&lt;br&gt;
Fewer security controls mean:&lt;br&gt;
Faster release cycles&lt;br&gt;
Less friction&lt;br&gt;
Lower development costs&lt;br&gt;
In the short term, shareholders benefit too.&lt;br&gt;
Money not spent on “invisible” protection increases margins.&lt;br&gt;
Security success looks like nothing happened.&lt;br&gt;
Velocity shows up on dashboards.&lt;br&gt;
Incentives follow metrics.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Who Pays When Security Fails?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The first to pay are usually end users.&lt;/p&gt;

&lt;p&gt;They lose:&lt;/p&gt;

&lt;p&gt;Identity&lt;/p&gt;

&lt;p&gt;Financial data&lt;/p&gt;

&lt;p&gt;Time&lt;/p&gt;

&lt;p&gt;Trust&lt;/p&gt;

&lt;p&gt;Sometimes CISOs and security engineers pay with their jobs.&lt;/p&gt;

&lt;p&gt;Companies pay reputation damage.&lt;/p&gt;

&lt;p&gt;But here’s the deeper problem:&lt;/p&gt;

&lt;p&gt;The people harmed are often not the same people making security budget decisions.&lt;/p&gt;

&lt;p&gt;When cost and decision-making are separated, security weakens structurally.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Who Decides Security Budgets?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Typically the CFO and the Board.&lt;/p&gt;

&lt;p&gt;Security is often treated as a cost center.&lt;/p&gt;

&lt;p&gt;Budgets are frequently driven by compliance:&lt;/p&gt;

&lt;p&gt;“What is the minimum required to stay legal?”&lt;/p&gt;

&lt;p&gt;The issue isn’t ignorance.&lt;/p&gt;

&lt;p&gt;It’s that security risk is probabilistic.&lt;br&gt;
Feature revenue is measurable.&lt;/p&gt;

&lt;p&gt;You can measure revenue from a new product feature.&lt;/p&gt;

&lt;p&gt;You cannot precisely measure revenue saved from preventing a hypothetical breach.&lt;/p&gt;

&lt;p&gt;And in business, measurable value usually wins.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Gets Removed for Convenience?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Session timeouts are a classic example.&lt;/p&gt;

&lt;p&gt;Users hate being logged out frequently.&lt;br&gt;
So sessions are extended.&lt;/p&gt;

&lt;p&gt;This increases the window for session hijacking.&lt;/p&gt;

&lt;p&gt;Convenience expands attack surface.&lt;/p&gt;

&lt;p&gt;Security friction competes directly with user retention.&lt;/p&gt;

&lt;p&gt;What Risks Are Ignored Because They’re “Unlikely”?&lt;/p&gt;

&lt;p&gt;Physical data center breaches.&lt;br&gt;
Black swan infrastructure failures.&lt;br&gt;
Extreme disaster scenarios.&lt;/p&gt;

&lt;p&gt;Companies calculate expected loss:&lt;/p&gt;

&lt;p&gt;Probability × Impact&lt;/p&gt;

&lt;p&gt;If probability feels extremely low, mitigation feels wasteful.&lt;/p&gt;

&lt;p&gt;The problem?&lt;/p&gt;

&lt;p&gt;Probability estimates are often wrong.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Vulnerabilities Exist Because Fixing Them Is Boring?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Dependency management and patching.&lt;/p&gt;

&lt;p&gt;Updating libraries is tedious.&lt;br&gt;
It doesn’t create flashy features.&lt;/p&gt;

&lt;p&gt;So technical debt accumulates.&lt;/p&gt;

&lt;p&gt;Security debt compounds silently.&lt;/p&gt;

&lt;p&gt;When something like Log4j happens, the cost of boring neglect becomes visible overnight.&lt;/p&gt;

&lt;p&gt;What Would Be Secure But Terrible for User Experience?&lt;/p&gt;

&lt;p&gt;Air-gapped authentication.&lt;/p&gt;

&lt;p&gt;It would be extremely secure.&lt;/p&gt;

&lt;p&gt;It would also be impractical for most users.&lt;/p&gt;

&lt;p&gt;If security is too inconvenient, users leave.&lt;/p&gt;

&lt;p&gt;Security is not about maximum protection.&lt;/p&gt;

&lt;p&gt;It’s about optimal friction.&lt;/p&gt;

&lt;p&gt;The Real Pattern&lt;/p&gt;

&lt;p&gt;Security is governed by incentives, not ignorance.&lt;/p&gt;

&lt;p&gt;Speed is rewarded.&lt;/p&gt;

&lt;p&gt;Profit is rewarded.&lt;/p&gt;

&lt;p&gt;Usability is rewarded.&lt;/p&gt;

&lt;p&gt;Compliance is enforceable.&lt;/p&gt;

&lt;p&gt;Hypothetical risk is abstract.&lt;/p&gt;

&lt;p&gt;Security is reactive because growth is proactive.&lt;/p&gt;

&lt;p&gt;Until the cost of insecurity directly reaches decision-makers, security will always be slightly late.&lt;/p&gt;

&lt;p&gt;Final Thought&lt;/p&gt;

&lt;p&gt;Security is not just a technical discipline.&lt;/p&gt;

&lt;p&gt;It is economics.&lt;br&gt;
It is psychology.&lt;br&gt;
It is governance.&lt;br&gt;
It is design.&lt;/p&gt;

&lt;p&gt;And most importantly:&lt;/p&gt;

&lt;p&gt;It is an incentive problem.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>discuss</category>
      <category>management</category>
      <category>security</category>
    </item>
    <item>
      <title>Why Security is Always Late: Economics, Zero-Days, and Attacker Math</title>
      <dc:creator>Saranyo Deyasi</dc:creator>
      <pubDate>Mon, 02 Mar 2026 18:14:37 +0000</pubDate>
      <link>https://forem.com/zerocool_2012/gemini-saidwhy-security-is-always-late-economics-zero-days-and-attacker-math-gd2</link>
      <guid>https://forem.com/zerocool_2012/gemini-saidwhy-security-is-always-late-economics-zero-days-and-attacker-math-gd2</guid>
      <description>&lt;p&gt;We’ve all seen the headlines. Another day, another massive data breach, another critical system compromised, another "we take security seriously" statement.&lt;/p&gt;

&lt;p&gt;It raises a cynical, yet crucial question: Why is security always the last thing to arrive?&lt;/p&gt;

&lt;p&gt;We pour billions into cybersecurity, yet we are always reacting. We buy the locks after the house has been robbed.&lt;/p&gt;

&lt;p&gt;This isn't just a failure of imagination or technology. It is a failure dictated by the harsh economics of software development, the immutable laws of complexity, and the fundamental asymmetric math of attack and defense.&lt;/p&gt;

&lt;p&gt;Security is not late because engineers are careless. It’s late because reality moves faster than assumptions.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Security Doesn’t Ship Products
We have to start with the uncomfortable reality of business economics. Every software project exists under the intense pressure of "time to market."&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;When a company builds a product, they are focused on Value Delivery. They need a feature that solves a problem, generates revenue, or attracts users. If they don't deliver that value quickly, a competitor will.&lt;/p&gt;

&lt;p&gt;In this high-stakes race, security is often viewed not as a feature, but as friction.&lt;/p&gt;

&lt;p&gt;Security doesn't demo well: No investor has ever been thrilled by a product whose main feature is "it didn't get hacked today."&lt;/p&gt;

&lt;p&gt;Security increases complexity: Strong authentication, encryption, and input validation all add friction to the development cycle and the user experience.&lt;/p&gt;

&lt;p&gt;The Cost-Benefit Fallacy: Spending $50,000 on security auditing feels like a loss, while spending $50,000 on marketing feels like an investment.&lt;/p&gt;

&lt;p&gt;The market rewards the first to ship, not the safest to ship.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Speed Creates Unknown Vulnerabilities
When speed is the metric, shortcuts are inevitable. This is the concept of Technical Debt applied to security.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The fastest way to build a feature is rarely the most secure way.&lt;/p&gt;

&lt;p&gt;The Problem of Dependencies: To move quickly, developers rely heavily on third-party libraries and open-source packages (like npm or pip). This is essential for modern development, but it means your application is only as secure as the weakest link in a chain of code you didn't write. Remember Log4j?&lt;/p&gt;

&lt;p&gt;Configuration Drift: In the rush to get a service live, "good enough" configurations become permanent. Default settings—which are designed for ease of use, not security—remain in production, creating open doors.&lt;/p&gt;

&lt;p&gt;The Complexity Paradox: The faster you build, the more complex the system becomes. As the number of components and interactions grows, the possible attack paths expand exponentially. Complexity is the enemy of security.&lt;/p&gt;

&lt;p&gt;Every line of code written in haste is a potential invitation to an attacker.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Defenders vs. Attackers is Not a Fair Game
The core problem of cybersecurity is that it is a fundamentally asymmetric game. The math does not favor the defender.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The Defender's Dilemma&lt;br&gt;
A defender must protect every single point of entry, every line of code, every configuration setting, every open port, and every employee from a phishing email. They have to get it right 100% of the time, 24 hours a day.&lt;/p&gt;

&lt;p&gt;The Attacker's Advantage&lt;br&gt;
An attacker only needs to find one single weakness. They only need to get it right once.&lt;/p&gt;

&lt;p&gt;Furthermore, attackers have their own favorable economics. A team of highly paid, professional penetration testers costs hundreds of thousands of dollars to defend a system. A lone attacker using automated tools to scan the entire internet for known vulnerabilities costs almost nothing.&lt;/p&gt;

&lt;p&gt;Security is always late because the defenders are trying to build a perfect wall, while the attackers only need a ladder.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Why "Secure by Design" is Hard in Reality
The industry consensus is that we must shift security "left," integrating it into the design phase of the development lifecycle (SDLC). While theoretically sound, implementing "Secure by Design" is exceptionally difficult.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;It requires a fundamental shift in mindset:&lt;/p&gt;

&lt;p&gt;From Features to Threat Models: It demands that architects anticipate not just what a user will do, but what an attacker might do.&lt;/p&gt;

&lt;p&gt;From Speed to Scrutiny: It requires slow-downs, such as code reviews and architecture analysis, when the entire ecosystem is screaming for speed.&lt;/p&gt;

&lt;p&gt;The Knowledge Gap: It assumes that every developer is a security expert. The reality is that secure coding is a specialized skill that is often not taught in computer science degree programs or bootcamps.&lt;/p&gt;

&lt;p&gt;We want "Secure by Design," but the market rewards "Fast to Deliver."&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Why Security Always Follows Failure
This all culminates in the reactive nature of the industry. The vast majority of security spending is triggered by a failure event.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;A "Zero-Day" vulnerability—a flaw known to attackers but unknown to the defenders—exists by definition before the patch. We can only create a vaccine once we have identified the virus.&lt;/p&gt;

&lt;p&gt;This creates a necessary and tragic loop:&lt;/p&gt;

&lt;p&gt;A new technology is built (IoT, Cloud, AI).&lt;/p&gt;

&lt;p&gt;It is shipped as quickly as possible, ignoring security for features.&lt;/p&gt;

&lt;p&gt;The technology gains widespread adoption.&lt;/p&gt;

&lt;p&gt;A significant attack succeeds, exposing the critical flaw.&lt;/p&gt;

&lt;p&gt;Only then does security receive the funding, attention, and mandates required to "fix" the problem.&lt;/p&gt;

&lt;p&gt;This pattern is not a failure of individual engineers; it is the systemic consequence of prioritizing immediate value over long-term stability.&lt;/p&gt;

&lt;p&gt;Final Thought&lt;br&gt;
We will never "solve" security. As long as we build software, we will create vulnerabilities. We must accept that security will always be a step behind.&lt;/p&gt;

&lt;p&gt;"Security is not late because engineers are careless — it’s late because reality moves faster than assumptions."&lt;/p&gt;

</description>
      <category>security</category>
      <category>devsecops</category>
      <category>software</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Why sudo exists: Linux’s solution to shared power and shared blame</title>
      <dc:creator>Saranyo Deyasi</dc:creator>
      <pubDate>Mon, 02 Mar 2026 17:45:40 +0000</pubDate>
      <link>https://forem.com/zerocool_2012/why-sudo-exists-linuxs-solution-to-shared-power-and-shared-blame-3b4a</link>
      <guid>https://forem.com/zerocool_2012/why-sudo-exists-linuxs-solution-to-shared-power-and-shared-blame-3b4a</guid>
      <description>&lt;p&gt;The Problem: The All-Powerful Root&lt;br&gt;
In Linux, the root account is the "God mode" of the system. It has the power to read any file, delete the entire operating system, or change hardware settings.&lt;/p&gt;

&lt;p&gt;Before sudo became the standard, there were two bad options for managing a system:&lt;/p&gt;

&lt;p&gt;Sharing the Root Password: You give the administrative password to everyone who needs to install a printer.&lt;/p&gt;

&lt;p&gt;The Risk: If one person makes a mistake or gets hacked, the entire system is toast. You also have no idea who ran which command.&lt;/p&gt;

&lt;p&gt;Logging in as Root: Staying logged in as the superuser for your daily tasks.&lt;/p&gt;

&lt;p&gt;The Risk: A simple typo like rm -rf / (delete everything) happens instantly without a "Are you sure?" prompt.&lt;/p&gt;

&lt;p&gt;The Solution: sudo&lt;br&gt;
sudo acts as a controlled gatekeeper. It solves three specific technical problems:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;The Principle of Least Privilege&lt;br&gt;
Instead of being "all-powerful" all the time, you operate as a normal, restricted user. You only "elevate" your privileges for the five seconds it takes to run a specific command. This prevents accidental system-wide damage from daily browsing or scripts.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Fine-Grained Access Control&lt;br&gt;
Through a file called /etc/sudoers, a System Administrator can give specific users permission to run only specific commands.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Example: You can let the "Junior Admin" restart the web server, but forbid them from touching the database or deleting users.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Accountability (The Audit Trail)
When you use sudo, the system logs the event. It records who ran the command, when they ran it, and exactly what they did. If the system crashes, you can look at the logs to see the specific command that caused the failure.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;How it Works Technically&lt;br&gt;
When you type sudo [command]:&lt;/p&gt;

&lt;p&gt;Authentication: sudo asks for your password, not the root password. This proves you are who you say you are.&lt;/p&gt;

&lt;p&gt;Authorization: It checks the sudoers file to see if you have permission to run that specific command.&lt;/p&gt;

&lt;p&gt;SetUID Bit: Technically, the sudo binary has a special "SetUID" permission bit. This allows the program to temporarily assume root's identity to carry out the task you requested.&lt;/p&gt;

</description>
      <category>linux</category>
      <category>sudo</category>
      <category>programming</category>
      <category>terminal</category>
    </item>
    <item>
      <title>From Curiosity to Code: My Technical Journey and Future Predictions</title>
      <dc:creator>Saranyo Deyasi</dc:creator>
      <pubDate>Mon, 23 Feb 2026 17:50:04 +0000</pubDate>
      <link>https://forem.com/zerocool_2012/from-curiosity-to-code-my-technical-journey-and-future-predictions-5gn6</link>
      <guid>https://forem.com/zerocool_2012/from-curiosity-to-code-my-technical-journey-and-future-predictions-5gn6</guid>
      <description>&lt;p&gt;When I first started exploring technology, I didn’t know where it would lead me. I was just a curious kid tinkering with computers, trying to understand how things worked. Fast forward a few years, and technology has become not just a passion but a pathway to learning, experimenting, and creating.&lt;/p&gt;

&lt;p&gt;My Technical Journey&lt;/p&gt;

&lt;p&gt;Over the years, I’ve dived into multiple areas of tech:&lt;/p&gt;

&lt;p&gt;Programming &amp;amp; Web Development: I’ve built mini web projects, chat platforms, and interactive websites. Each project taught me something new—from managing backend logic to designing a user-friendly interface.&lt;/p&gt;

&lt;p&gt;Artificial Intelligence &amp;amp; Data Analysis: Exploring AI has been a fascinating journey. I’ve worked with data analysis using Excel and implemented AI-based tools for practical use cases like automated content generation and predictive modeling.&lt;/p&gt;

&lt;p&gt;Cybersecurity: Understanding the world of cyber threats and defense mechanisms has been eye-opening. I’ve created tools for penetration testing, phishing detection, and vulnerability scanning, which gave me hands-on experience in securing digital environments.&lt;/p&gt;

&lt;p&gt;Project Management &amp;amp; Product Thinking: Beyond coding, I’ve learned how to structure projects, plan features, and iterate based on feedback—skills that are essential for turning ideas into real products.&lt;/p&gt;

&lt;p&gt;Through all these experiences, the most important lesson has been that technology is not just about writing code—it’s about problem-solving, creativity, and resilience.&lt;/p&gt;

&lt;p&gt;Key Lessons Learned&lt;/p&gt;

&lt;p&gt;Consistency beats intensity: Small, regular efforts compound over time.&lt;/p&gt;

&lt;p&gt;Curiosity drives growth: Never hesitate to explore unfamiliar domains; that’s where breakthroughs happen.&lt;/p&gt;

&lt;p&gt;Failure is feedback: Every bug, every failed experiment, is a chance to learn and improve.&lt;/p&gt;

&lt;p&gt;Collaboration is key: Working with others, even virtually, teaches you perspectives you can’t get alone.&lt;/p&gt;

&lt;p&gt;Looking Ahead: Future Predictions in Tech&lt;/p&gt;

&lt;p&gt;From my observations and experiences, here’s what I think the future holds:&lt;/p&gt;

&lt;p&gt;AI will be ubiquitous: From automating routine tasks to creating complex solutions, AI will continue to reshape industries.&lt;/p&gt;

&lt;p&gt;Cybersecurity will be more critical than ever: As technology advances, so will threats. Skills in security, ethical hacking, and threat intelligence will be in high demand.&lt;/p&gt;

&lt;p&gt;IoT and Smart Systems will expand: Connected devices will dominate homes, cities, and industries, requiring developers to think about scalability, security, and efficiency.&lt;/p&gt;

&lt;p&gt;Learning agility matters: The pace of tech evolution will make adaptability and continuous learning the most valuable skills.&lt;/p&gt;

&lt;p&gt;Personally, I plan to keep exploring AI, cybersecurity, and emerging technologies, turning small experiments into impactful projects.&lt;/p&gt;

&lt;p&gt;Advice to Fellow Learners&lt;/p&gt;

&lt;p&gt;If you’re starting your tech journey, my advice is simple: explore boldly, fail quickly, and keep learning every day. Your unique experiences will shape the solutions you create, and the challenges you overcome will define your growth.&lt;/p&gt;

&lt;p&gt;“No flower grows without rain, and no person becomes great without facing challenges.”&lt;/p&gt;

&lt;p&gt;This philosophy guides me as I navigate my own path in technology, and I hope it inspires others to embrace the journey, no matter how uncertain it may seem.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>sideprojects</category>
      <category>futurepredictions</category>
      <category>career</category>
    </item>
    <item>
      <title>I Realized Coding Is More About Thinking Than Typing</title>
      <dc:creator>Saranyo Deyasi</dc:creator>
      <pubDate>Mon, 29 Dec 2025 11:59:48 +0000</pubDate>
      <link>https://forem.com/zerocool_2012/i-realized-coding-is-more-about-thinking-than-typing-5b58</link>
      <guid>https://forem.com/zerocool_2012/i-realized-coding-is-more-about-thinking-than-typing-5b58</guid>
      <description>&lt;p&gt;When I first imagined a “good programmer,” I thought of someone typing insanely fast, switching between terminals, and writing thousands of lines of code without stopping.&lt;br&gt;
Reality hit me hard when I started building real projects.&lt;br&gt;
I realized something unexpected:&lt;br&gt;
Most of my time coding is spent not typing at all.&lt;br&gt;
Instead, I’m thinking.&lt;br&gt;
Thinking about:&lt;br&gt;
Why the code is failing even though it “looks right”&lt;br&gt;
How data moves from one part of the program to another&lt;br&gt;
What happens if the user enters the wrong input&lt;br&gt;
Why fixing one bug creates two new ones&lt;/p&gt;

&lt;p&gt;At first, this frustrated me.&lt;br&gt;
I thought I was slow. I thought I wasn’t good enough.&lt;/p&gt;

&lt;p&gt;But then I understood something important.&lt;/p&gt;

&lt;p&gt;💡 Coding Is Structured Thinking&lt;br&gt;
Typing code is the easy part.&lt;br&gt;
The hard part is breaking a problem into steps that a machine can understand.&lt;br&gt;
When code breaks, it’s rarely because of syntax.&lt;br&gt;
It’s because of logic.&lt;br&gt;
This changed how I approach programming. I stopped rushing and started thinking.&lt;/p&gt;

&lt;p&gt;🌍 Real-World Connection&lt;br&gt;
In the real tech industry, developers aren’t paid for how fast they type.&lt;br&gt;
They’re paid for how clearly they think.&lt;br&gt;
That’s why:&lt;br&gt;
Senior developers write less code&lt;br&gt;
Debugging is considered a skill&lt;br&gt;
Problem-solving matters more than languages&lt;/p&gt;

&lt;p&gt;🏁 Final Thought&lt;br&gt;
Coding didn’t just teach me programming.&lt;br&gt;
It trained my brain to think clearly, logically, and patiently — skills that apply far beyond computers.&lt;br&gt;
Typing makes code. Thinking makes software.&lt;br&gt;
I’m a young developer learning in public — feedback is welcome.&lt;/p&gt;

</description>
      <category>programming</category>
      <category>ai</category>
      <category>productivity</category>
    </item>
    <item>
      <title>🌐 Building SafeNet Jr. — A Student-Friendly Browser with Parental Controls</title>
      <dc:creator>Saranyo Deyasi</dc:creator>
      <pubDate>Thu, 28 Aug 2025 16:26:55 +0000</pubDate>
      <link>https://forem.com/zerocool_2012/building-safenet-jr-a-student-friendly-browser-with-parental-controls-4omk</link>
      <guid>https://forem.com/zerocool_2012/building-safenet-jr-a-student-friendly-browser-with-parental-controls-4omk</guid>
      <description>&lt;p&gt;Intro:&lt;br&gt;
One day, I asked myself: Why do browsers like Chrome or Brave get all the fun? Can I build my own? That’s when I started SafeNet Jr., a mini-browser with parental controls.&lt;/p&gt;

&lt;p&gt;Features I added:&lt;/p&gt;

&lt;p&gt;🚫 Blocked websites that distract students.&lt;/p&gt;

&lt;p&gt;🎯 Focus Mode — auto-blocks YouTube, Netflix, and other entertainment sites.&lt;/p&gt;

&lt;p&gt;🔐 Simple Parental Settings screen for adding/removing blocked sites.&lt;/p&gt;

&lt;p&gt;Why this matters:&lt;br&gt;
Students (like me!) get distracted a lot. Having a browser that encourages focus is a game-changer.&lt;/p&gt;

&lt;p&gt;What I learned:&lt;/p&gt;

&lt;p&gt;Web browsers are complicated, but even a demo version can teach you tons about HTML, CSS, and JavaScript.&lt;/p&gt;

&lt;p&gt;UI design is just as important as coding.&lt;/p&gt;

&lt;p&gt;Future idea:&lt;br&gt;
Maybe one day, SafeNet Jr. could become a real student browser that schools use.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>🤖 How I Built an AR Solar System Project with Python</title>
      <dc:creator>Saranyo Deyasi</dc:creator>
      <pubDate>Wed, 27 Aug 2025 18:01:40 +0000</pubDate>
      <link>https://forem.com/zerocool_2012/how-i-built-an-ar-solar-system-project-with-python-2llj</link>
      <guid>https://forem.com/zerocool_2012/how-i-built-an-ar-solar-system-project-with-python-2llj</guid>
      <description>&lt;p&gt;Making the Solar System Come Alive with Augmented Reality (School Project)&lt;/p&gt;

&lt;p&gt;In school, we were learning about planets, and I thought: What if I could see them floating in my room? That’s when I decided to build a mini Augmented Reality Solar System using Python.&lt;/p&gt;

&lt;p&gt;How I did it:&lt;br&gt;
🌍 Used Blender models for planets.&lt;br&gt;
📱 Connected it with an AR library in Python.&lt;br&gt;
🛰️ Added simple interactions like rotating planets with a click.&lt;/p&gt;

&lt;p&gt;Challenges I faced:&lt;br&gt;
Getting planet textures right 🌌.&lt;br&gt;
Making the models small enough to run on my laptop.&lt;/p&gt;

&lt;p&gt;Why this project is cool:&lt;br&gt;
Because it made science fun. Instead of just reading about Saturn’s rings, I could actually see them in 3D space.&lt;/p&gt;

&lt;p&gt;Tip for students:&lt;br&gt;
You don’t need high-end devices. Start with basic 3D models and small AR libraries. The fun part is experimenting.&lt;/p&gt;

</description>
      <category>python</category>
      <category>science</category>
      <category>eventdriven</category>
      <category>programming</category>
    </item>
    <item>
      <title>🔒 My First Cybersecurity Toolbox (Zerocool Edition)</title>
      <dc:creator>Saranyo Deyasi</dc:creator>
      <pubDate>Wed, 27 Aug 2025 18:00:04 +0000</pubDate>
      <link>https://forem.com/zerocool_2012/my-first-cybersecurity-toolbox-zerocool-edition-cic</link>
      <guid>https://forem.com/zerocool_2012/my-first-cybersecurity-toolbox-zerocool-edition-cic</guid>
      <description>&lt;p&gt;Title: Building My Own Cybersecurity Toolbox as a 12-Year-Old Developer&lt;/p&gt;

&lt;p&gt;Cybersecurity always felt like something only professionals could do. But recently, I started building my own cybersecurity toolbox called Zerocool Toolbox. It’s not advanced yet, but it’s a cool way for me to explore ethical hacking and security.&lt;/p&gt;

&lt;p&gt;What’s inside my toolbox?&lt;br&gt;
🔍 Port Scanner – to check open ports on a system.&lt;br&gt;
🛡️ Password Strength Checker – to test how secure a password is.&lt;br&gt;
📡 Basic Network Sniffer – captures packets (for learning purposes).&lt;br&gt;
🚫 Website Blocker – to block distracting or unsafe sites.&lt;/p&gt;

&lt;p&gt;Why I built it?&lt;br&gt;
To learn how hackers think (so I can defend better)&lt;br&gt;
To practice Python networking libraries.&lt;br&gt;
To have my own set of tools as a beginner.&lt;/p&gt;

&lt;p&gt;Takeaway:&lt;br&gt;
If you’re starting out in cybersecurity, don’t wait until you’re an expert. Start small, build tools, and share your progress. Even a simple password checker is a great step!&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
