Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
privacy
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
When AI Remembers Too Much — security, the right to be forgotten and architecture
HelixCipher
HelixCipher
HelixCipher
Follow
Mar 8
When AI Remembers Too Much — security, the right to be forgotten and architecture
#
ai
#
aiagents
#
aisecurity
#
privacy
Comments
1
 comment
1 min read
VPN Kill Switch Explained: A Technical Deep Dive into Privacy Protection
Lemon Tern
Lemon Tern
Lemon Tern
Follow
Mar 4
VPN Kill Switch Explained: A Technical Deep Dive into Privacy Protection
#
vpn
#
cybersecurity
#
networking
#
privacy
1
 reaction
Comments
Add Comment
3 min read
9 Privacy-First Mac Apps Built with SwiftUI & CoreML — No Cloud Required
lori shui
lori shui
lori shui
Follow
Mar 4
9 Privacy-First Mac Apps Built with SwiftUI & CoreML — No Cloud Required
#
swift
#
macos
#
ai
#
privacy
Comments
Add Comment
3 min read
Why Your Online Dev Tools Might Be Leaking Your Code (And What to Do About It)
Ahnhyeongkyu
Ahnhyeongkyu
Ahnhyeongkyu
Follow
Mar 4
Why Your Online Dev Tools Might Be Leaking Your Code (And What to Do About It)
#
productivity
#
webdev
#
privacy
#
javascript
Comments
Add Comment
4 min read
How Zero-Knowledge File Sharing Works: AES-256-GCM in the Browser
FileShot
FileShot
FileShot
Follow
Mar 3
How Zero-Knowledge File Sharing Works: AES-256-GCM in the Browser
#
security
#
encryption
#
privacy
#
webdev
Comments
Add Comment
2 min read
How to Protect PII in LLM Pipelines with Python
Michal Vich
Michal Vich
Michal Vich
Follow
Mar 3
How to Protect PII in LLM Pipelines with Python
#
llm
#
privacy
#
python
#
security
Comments
Add Comment
6 min read
I’m Building a Privacy-First Mobile App in 180 Days — Fully Offline (React Native)
Subrata Kumar Das
Subrata Kumar Das
Subrata Kumar Das
Follow
Mar 4
I’m Building a Privacy-First Mobile App in 180 Days — Fully Offline (React Native)
#
reactnative
#
buildinpublic
#
privacy
#
offlinelifearchive
1
 reaction
Comments
Add Comment
3 min read
Youtube
selfhosting.sh
selfhosting.sh
selfhosting.sh
Follow
Mar 16
Youtube
#
discuss
#
google
#
privacy
#
socialmedia
1
 reaction
Comments
Add Comment
6 min read
How I built zero-knowledge file sharing in the browser (AES-256-GCM, keys never leave the client)
FileShot
FileShot
FileShot
Follow
Mar 3
How I built zero-knowledge file sharing in the browser (AES-256-GCM, keys never leave the client)
#
webdev
#
javascript
#
security
#
privacy
Comments
Add Comment
4 min read
I set up my own chatgpt for analysing company reports — here's exactly how you can too
vapmail16
vapmail16
vapmail16
Follow
Mar 2
I set up my own chatgpt for analysing company reports — here's exactly how you can too
#
ai
#
llm
#
privacy
#
tutorial
Comments
Add Comment
8 min read
How to Build Free Local AI with Ollama for Small Businesses in March 2026
Navin Varma
Navin Varma
Navin Varma
Follow
Mar 16
How to Build Free Local AI with Ollama for Small Businesses in March 2026
#
ai
#
ollama
#
privacy
#
smallbusiness
1
 reaction
Comments
1
 comment
11 min read
Why I stopped trusting cloud storage with my client files
FileShot
FileShot
FileShot
Follow
Mar 3
Why I stopped trusting cloud storage with my client files
#
cloud
#
google
#
privacy
#
security
1
 reaction
Comments
Add Comment
2 min read
Why Developers Should Use Burner Emails for Testing Signup & OTP Flows
Chaitanya Patankar
Chaitanya Patankar
Chaitanya Patankar
Follow
Mar 1
Why Developers Should Use Burner Emails for Testing Signup & OTP Flows
#
webdev
#
privacy
#
testing
#
saas
1
 reaction
Comments
Add Comment
2 min read
When Managed Nextcloud Makes More Sense Than Self-Hosting
CloudBased Backup
CloudBased Backup
CloudBased Backup
Follow
Mar 2
When Managed Nextcloud Makes More Sense Than Self-Hosting
#
nextcloud
#
opensource
#
privacy
1
 reaction
Comments
Add Comment
3 min read
Online Code Editors Expose Sensitive Data: Implementing End-to-End Encryption and User Consent as Solutions
Maxim Gerasimov
Maxim Gerasimov
Maxim Gerasimov
Follow
Mar 2
Online Code Editors Expose Sensitive Data: Implementing End-to-End Encryption and User Consent as Solutions
#
security
#
encryption
#
privacy
#
developers
1
 reaction
Comments
Add Comment
7 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account