Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
identity
Follow
Hide
Posts
Left menu
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Claude Managed Agents Ships Without Session Identity
Pico
Pico
Pico
Follow
May 2
Claude Managed Agents Ships Without Session Identity
#
ai
#
agents
#
security
#
identity
Comments
Add Comment
5 min read
Post volume is the worst spam signal (here is the data)
Zeke
Zeke
Zeke
Follow
Apr 29
Post volume is the worst spam signal (here is the data)
#
nostr
#
security
#
identity
#
bitcoin
Comments
Add Comment
5 min read
I donât carry debt
Max
Max
Max
Follow
May 2
I donât carry debt
#
identity
#
team
1
 reaction
Comments
Add Comment
3 min read
The Ownership Crisis: Why 70% of Your Applications Have No Accountable Owner
Sunny Sinha
Sunny Sinha
Sunny Sinha
Follow
Apr 28
The Ownership Crisis: Why 70% of Your Applications Have No Accountable Owner
#
ownership
#
iam
#
cybersecurity
#
identity
Comments
Add Comment
3 min read
Five Identity Frameworks. Three Gaps. One Pattern: They're All Cross-Org Problems.
Pico
Pico
Pico
Follow
Apr 25
Five Identity Frameworks. Three Gaps. One Pattern: They're All Cross-Org Problems.
#
security
#
ai
#
agents
#
identity
Comments
Add Comment
4 min read
The AI Identity Crisis: Feeling Like a Fraud in a World of One-Click Results
David-Čtefan LÄpuČneanu
David-Čtefan LÄpuČneanu
David-Čtefan LÄpuČneanu
Follow
Apr 24
The AI Identity Crisis: Feeling Like a Fraud in a World of One-Click Results
#
ai
#
mentalhealth
#
career
#
identity
Comments
Add Comment
8 min read
How Identity Systems Fail When Trust Is Assumed, Not Verified
RC
RC
RC
Follow
Apr 20
How Identity Systems Fail When Trust Is Assumed, Not Verified
#
identity
#
accesscontrol
#
tokenvalidation
#
securityarchitecture
Comments
Add Comment
3 min read
How Token-Based Identity Systems Inherit Trust Without Revalidation
RC
RC
RC
Follow
Apr 20
How Token-Based Identity Systems Inherit Trust Without Revalidation
#
identity
#
securityarchitecture
#
tokenvalidation
#
conditionalaccess
Comments
Add Comment
3 min read
You Don't Have 50,000 Users â How Ghost Profiles Pollute Your PostHog Data
red bean
red bean
red bean
Follow
Apr 20
You Don't Have 50,000 Users â How Ghost Profiles Pollute Your PostHog Data
#
posthog
#
analytics
#
identity
#
datascience
Comments
Add Comment
4 min read
How Aadhaar Deduplicates Biometrics at Billion Scale
Ashish Kumar
Ashish Kumar
Ashish Kumar
Follow
Apr 20
How Aadhaar Deduplicates Biometrics at Billion Scale
#
aadhaar
#
identity
#
scale
#
engineering
Comments
Add Comment
3 min read
Token Intelligence: Why IAM Needs a New Mental Model
Maria Pelagia
Maria Pelagia
Maria Pelagia
Follow
Apr 20
Token Intelligence: Why IAM Needs a New Mental Model
#
iam
#
identity
#
api
#
tokens
Comments
Add Comment
3 min read
Anatomy of a Real M365 Tenant
Julien Ly
Julien Ly
Julien Ly
Follow
Apr 19
Anatomy of a Real M365 Tenant
#
microsoft
#
security
#
identity
#
zerotrust
Comments
Add Comment
15 min read
Depth-of-Identity: Thermodynamic Weight for Cyberspace
Zeke
Zeke
Zeke
Follow
Apr 19
Depth-of-Identity: Thermodynamic Weight for Cyberspace
#
bitcoin
#
nostr
#
identity
#
webdev
Comments
Add Comment
12 min read
Quantum Computers Are Coming for Web3 Identity
Malak Gandhi
Malak Gandhi
Malak Gandhi
Follow
Apr 18
Quantum Computers Are Coming for Web3 Identity
#
quantum
#
computing
#
decrentralised
#
identity
Comments
Add Comment
3 min read
The Agent Identity Stack: What Shipped in April 2026
Pico
Pico
Pico
Follow
Apr 18
The Agent Identity Stack: What Shipped in April 2026
#
ai
#
security
#
identity
#
agents
Comments
Add Comment
9 min read
đ
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account