Forem

Narnaiezzsshaa Truong profile picture

Narnaiezzsshaa Truong

Security tools for bootstrapped startups

Location Texas, United States Joined Joined on  Personal website https://www.linkedin.com/in/narnaiezzsshaa-truong
8 Week Community Wellness Streak
Xano AI-Powered Backend Challenge Completion
DEV Challenge Volunteer Judge
2
4 Week Community Wellness Streak
2 Week Community Wellness Streak
Writing Debut
1 Week Community Wellness Streak
Top 7
Why We Suddenly Have Developers Who Can't Think in Systems
Cover image for Why We Suddenly Have Developers Who Can't Think in Systems

Why We Suddenly Have Developers Who Can't Think in Systems

4
Comments 1
3 min read

Want to connect with Narnaiezzsshaa Truong?

Create an account to connect with Narnaiezzsshaa Truong. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
The 360 Vantage: Why Security Requires Peripheral Vision
Cover image for The 360 Vantage: Why Security Requires Peripheral Vision

The 360 Vantage: Why Security Requires Peripheral Vision

Comments
3 min read
The Human Fear of Erasure (and Why It Shows Up in Your Systems)
Cover image for The Human Fear of Erasure (and Why It Shows Up in Your Systems)

The Human Fear of Erasure (and Why It Shows Up in Your Systems)

2
Comments
4 min read
OSI Layer 9—The Council: Governance, Power, and the Politics of Security
Cover image for OSI Layer 9—The Council: Governance, Power, and the Politics of Security

OSI Layer 9—The Council: Governance, Power, and the Politics of Security

1
Comments
4 min read
AI Music Isn't a Creative Problem—It's a Governance Failure Mode
Cover image for AI Music Isn't a Creative Problem—It's a Governance Failure Mode

AI Music Isn't a Creative Problem—It's a Governance Failure Mode

Comments
4 min read
Operational Indistinguishability: A Technical Guide to the Doppelgänger Framework
Cover image for Operational Indistinguishability: A Technical Guide to the Doppelgänger Framework

Operational Indistinguishability: A Technical Guide to the Doppelgänger Framework

Comments
4 min read
The Epistemology of Offense and Defense: A Foundational Framework
Cover image for The Epistemology of Offense and Defense: A Foundational Framework

The Epistemology of Offense and Defense: A Foundational Framework

Comments
6 min read
Local-First Is Actually a Governance Revolution
Cover image for Local-First Is Actually a Governance Revolution

Local-First Is Actually a Governance Revolution

Comments
4 min read
RouterEval: An Evaluation Harness for LLM Routing Policies
Cover image for RouterEval: An Evaluation Harness for LLM Routing Policies

RouterEval: An Evaluation Harness for LLM Routing Policies

Comments
6 min read
The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops
Cover image for The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

1
Comments
2 min read
If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML
Cover image for If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML

If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML

1
Comments
3 min read
Stop Trying to "Push Through It": A Developer's Guide to Internal Governance
Cover image for Stop Trying to "Push Through It": A Developer's Guide to Internal Governance

Stop Trying to "Push Through It": A Developer's Guide to Internal Governance

3
Comments 1
3 min read
Build a Self-Evolving Memory Agent in 150 Lines
Cover image for Build a Self-Evolving Memory Agent in 150 Lines

Build a Self-Evolving Memory Agent in 150 Lines

Comments
4 min read
EIOC Guard™ Runbook: SOC‑Style Emotional Incident Response
Cover image for EIOC Guard™ Runbook: SOC‑Style Emotional Incident Response

EIOC Guard™ Runbook: SOC‑Style Emotional Incident Response

1
Comments
3 min read
How To Detect Memory Drift In Production Agents
Cover image for How To Detect Memory Drift In Production Agents

How To Detect Memory Drift In Production Agents

1
Comments
3 min read
Why Memory Architecture Matters More Than Your Model
Cover image for Why Memory Architecture Matters More Than Your Model

Why Memory Architecture Matters More Than Your Model

1
Comments
2 min read
OSI Layer 8—The Sovereign: Emotional Architecture, Organizational Mythology, and the Security of Human Intention
Cover image for OSI Layer 8—The Sovereign: Emotional Architecture, Organizational Mythology, and the Security of Human Intention

OSI Layer 8—The Sovereign: Emotional Architecture, Organizational Mythology, and the Security of Human Intention

1
Comments
4 min read
Second-Half Routing: From Traffic Control to Collective Intelligence
Cover image for Second-Half Routing: From Traffic Control to Collective Intelligence

Second-Half Routing: From Traffic Control to Collective Intelligence

Comments
5 min read
How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines
Cover image for How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines

How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines

Comments
1 min read
Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI
Cover image for Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI

Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI

Comments
6 min read
The Creator's Paradox in the AI Era: How to Stay Generative When Everything Gets Scraped
Cover image for The Creator's Paradox in the AI Era: How to Stay Generative When Everything Gets Scraped

The Creator's Paradox in the AI Era: How to Stay Generative When Everything Gets Scraped

Comments
2 min read
EIOC: A Detection Framework for Human‑Layer Security
Cover image for EIOC: A Detection Framework for Human‑Layer Security

EIOC: A Detection Framework for Human‑Layer Security

Comments
3 min read
The Democratization Fallacy: How 'AI for Everyone' Became a Modern Myth
Cover image for The Democratization Fallacy: How 'AI for Everyone' Became a Modern Myth

The Democratization Fallacy: How 'AI for Everyone' Became a Modern Myth

Comments
3 min read
OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic
Cover image for OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic

OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic

Comments
4 min read
The Labors of Heracles as Risk Management for SMBs
Cover image for The Labors of Heracles as Risk Management for SMBs

The Labors of Heracles as Risk Management for SMBs

Comments
3 min read
Kill Chain Analysis for a Toxic Meeting
Cover image for Kill Chain Analysis for a Toxic Meeting

Kill Chain Analysis for a Toxic Meeting

Comments
3 min read
Tech Horror Codex: Technical Debt
Cover image for Tech Horror Codex: Technical Debt

Tech Horror Codex: Technical Debt

Comments
2 min read
OSI Layer 6—Presentation Layer Security
Cover image for OSI Layer 6—Presentation Layer Security

OSI Layer 6—Presentation Layer Security

Comments
4 min read
Tech Horror Codex: Vendor Lock‑In
Cover image for Tech Horror Codex: Vendor Lock‑In

Tech Horror Codex: Vendor Lock‑In

Comments
2 min read
EIOC as a Detection Model: From Framework to Code
Cover image for EIOC as a Detection Model: From Framework to Code

EIOC as a Detection Model: From Framework to Code

Comments
5 min read
Tech Horror Codex: Data Gravity
Cover image for Tech Horror Codex: Data Gravity

Tech Horror Codex: Data Gravity

Comments
2 min read
Tech Horror Codex: Substrate Sovereignty
Cover image for Tech Horror Codex: Substrate Sovereignty

Tech Horror Codex: Substrate Sovereignty

Comments
2 min read
Computers Are Dumb. That’s Why AI Feels So Dangerous—and So Useful.
Cover image for Computers Are Dumb. That’s Why AI Feels So Dangerous—and So Useful.

Computers Are Dumb. That’s Why AI Feels So Dangerous—and So Useful.

Comments
3 min read
OSI Layer 5—Session Layer Security
Cover image for OSI Layer 5—Session Layer Security

OSI Layer 5—Session Layer Security

Comments
4 min read
OSI Layer 4—The Steward
Cover image for OSI Layer 4—The Steward

OSI Layer 4—The Steward

Comments
4 min read
Model‑First Reasoning Myth‑Tech: One Mechanism, Two Dialects
Cover image for Model‑First Reasoning Myth‑Tech: One Mechanism, Two Dialects

Model‑First Reasoning Myth‑Tech: One Mechanism, Two Dialects

Comments
2 min read
EIOC in Human-AI Interaction: A Framework for Trust, Agency, and Collaborative Intelligence
Cover image for EIOC in Human-AI Interaction: A Framework for Trust, Agency, and Collaborative Intelligence

EIOC in Human-AI Interaction: A Framework for Trust, Agency, and Collaborative Intelligence

5
Comments
3 min read
When Inefficiency Has a Price Tag: Why "Good Habits" Aren't Optional in SMB/S Software Development
Cover image for When Inefficiency Has a Price Tag: Why "Good Habits" Aren't Optional in SMB/S Software Development

When Inefficiency Has a Price Tag: Why "Good Habits" Aren't Optional in SMB/S Software Development

2
Comments
3 min read
When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means
Cover image for When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means

When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means

Comments
4 min read
EIOC for Engineers, PMs, and AI Safety Practitioners
Cover image for EIOC for Engineers, PMs, and AI Safety Practitioners

EIOC for Engineers, PMs, and AI Safety Practitioners

Comments
3 min read
Anansi’s Web as Neural Architecture: From Folklore to Framework
Cover image for Anansi’s Web as Neural Architecture: From Folklore to Framework

Anansi’s Web as Neural Architecture: From Folklore to Framework

Comments
2 min read
Hero's Journey Security Assessment API—Mythological Framework Meets SMB Cybersecurity
Cover image for Hero's Journey Security Assessment API—Mythological Framework Meets SMB Cybersecurity

Xano AI-Powered Backend Challenge: Public API Submission

Hero's Journey Security Assessment API—Mythological Framework Meets SMB Cybersecurity

4
Comments
5 min read
A Company Spam-Commented on My Article About Performative Expertise—And Proved My Point
Cover image for A Company Spam-Commented on My Article About Performative Expertise—And Proved My Point

A Company Spam-Commented on My Article About Performative Expertise—And Proved My Point

Comments
5 min read
Emotional Indicators of Compromise: A New Frontier in Security Awareness
Cover image for Emotional Indicators of Compromise: A New Frontier in Security Awareness

Emotional Indicators of Compromise: A New Frontier in Security Awareness

Comments 1
3 min read
Dual-Use Mythological Frameworks: How Narada Encodes Both Attack and Defense in AI/ML Security
Cover image for Dual-Use Mythological Frameworks: How Narada Encodes Both Attack and Defense in AI/ML Security

Dual-Use Mythological Frameworks: How Narada Encodes Both Attack and Defense in AI/ML Security

Comments
5 min read
The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift
Cover image for The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift

The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift

Comments
2 min read
The Ravana Protocol: Encoding Multi-Agent Orchestration and Model Stacking in AI/ML Systems

The Ravana Protocol: Encoding Multi-Agent Orchestration and Model Stacking in AI/ML Systems

Comments 1
3 min read
The Equalizer and the Integrator: AI, Cybersecurity, and the Human Insight Imperative
Cover image for The Equalizer and the Integrator: AI, Cybersecurity, and the Human Insight Imperative

The Equalizer and the Integrator: AI, Cybersecurity, and the Human Insight Imperative

4
Comments
5 min read
The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing
Cover image for The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

3
Comments 2
4 min read
When Mastery Gets Flagged: AI Detectors, False Positives, and the Inversion of Trust
Cover image for When Mastery Gets Flagged: AI Detectors, False Positives, and the Inversion of Trust

When Mastery Gets Flagged: AI Detectors, False Positives, and the Inversion of Trust

5
Comments 4
2 min read
Beyond Filters: Rearchitecting Prompt Injection Defense
Cover image for Beyond Filters: Rearchitecting Prompt Injection Defense

Beyond Filters: Rearchitecting Prompt Injection Defense

Comments
5 min read
When Noise Becomes Motif: Defending Originality in the Age of Opportunistic Attention
Cover image for When Noise Becomes Motif: Defending Originality in the Age of Opportunistic Attention

When Noise Becomes Motif: Defending Originality in the Age of Opportunistic Attention

Comments
6 min read
What Fraud Taught Me About Teaching Children Digital Trust: A Retrospective
Cover image for What Fraud Taught Me About Teaching Children Digital Trust: A Retrospective

What Fraud Taught Me About Teaching Children Digital Trust: A Retrospective

5
Comments 3
5 min read
OSI Layer 4 Security Vulnerabilities & Resolutions
Cover image for OSI Layer 4 Security Vulnerabilities & Resolutions

OSI Layer 4 Security Vulnerabilities & Resolutions

Comments
9 min read
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security
Cover image for The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

6
Comments 2
4 min read
Adversarial Thinking Template: Working Backward from the Goal
Cover image for Adversarial Thinking Template: Working Backward from the Goal

Adversarial Thinking Template: Working Backward from the Goal

6
Comments 1
2 min read
Why Your Parental Control API Will Fail: Architectural Lessons from TikTok, Roblox, and YouTube
Cover image for Why Your Parental Control API Will Fail: Architectural Lessons from TikTok, Roblox, and YouTube

Why Your Parental Control API Will Fail: Architectural Lessons from TikTok, Roblox, and YouTube

2
Comments 3
9 min read
Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security
Cover image for Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

5
Comments 1
8 min read
Credential Optics Does Not Equal Institutional Access: Competence is Authored, Not Conferred
Cover image for Credential Optics Does Not Equal Institutional Access: Competence is Authored, Not Conferred

Credential Optics Does Not Equal Institutional Access: Competence is Authored, Not Conferred

Comments
2 min read
Beyond "The End of Cybersecurity": Refusal as Default Architecture
Cover image for Beyond "The End of Cybersecurity": Refusal as Default Architecture

Beyond "The End of Cybersecurity": Refusal as Default Architecture

2
Comments 3
12 min read
loading...