Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why We Need Cryptographic Proof of What AI Refused to Generate: Building Verifiable Refusal Provenance with CAP-SRP
Cover image for Why We Need Cryptographic Proof of What AI Refused to Generate: Building Verifiable Refusal Provenance with CAP-SRP

Why We Need Cryptographic Proof of What AI Refused to Generate: Building Verifiable Refusal Provenance with CAP-SRP

1
Comments
25 min read
Your Phone Already Has the Hardware to Prove a Photo Is Real. Nothing Uses It.

Your Phone Already Has the Hardware to Prove a Photo Is Real. Nothing Uses It.

Comments
3 min read
Dispatch From the Other Side: From Scripts to Software
Cover image for Dispatch From the Other Side: From Scripts to Software

Dispatch From the Other Side: From Scripts to Software

1
Comments
2 min read
I built a reproducible PKI and TLS lab inside a constrained mobile environment
Cover image for I built a reproducible PKI and TLS lab inside a constrained mobile environment

I built a reproducible PKI and TLS lab inside a constrained mobile environment

Comments
8 min read
GenosDB: A Solution for Trust in Distributed Systems
Cover image for GenosDB: A Solution for Trust in Distributed Systems

GenosDB: A Solution for Trust in Distributed Systems

Comments
3 min read
How a Small OSINT Team Turned the Epstein Files Dump Into Actionable Intelligence
Cover image for How a Small OSINT Team Turned the Epstein Files Dump Into Actionable Intelligence

How a Small OSINT Team Turned the Epstein Files Dump Into Actionable Intelligence

1
Comments
5 min read
Vibe Coding Security: Why Traditional AppSec Breaks
Cover image for Vibe Coding Security: Why Traditional AppSec Breaks

Vibe Coding Security: Why Traditional AppSec Breaks

2
Comments
6 min read
Refactoring Legacy Website and the Test Suite That Never Was

Refactoring Legacy Website and the Test Suite That Never Was

Comments
2 min read
AI Agents Run Unsandboxed Code — How to Fix It (2026)

AI Agents Run Unsandboxed Code — How to Fix It (2026)

Comments
4 min read
Hide a tree in a forest: a messenger that pretends to be a temperature sensor

Hide a tree in a forest: a messenger that pretends to be a temperature sensor

Comments
7 min read
OpenClaw Isn't the Problem. Your Agent Architecture Is.
Cover image for OpenClaw Isn't the Problem. Your Agent Architecture Is.

OpenClaw Isn't the Problem. Your Agent Architecture Is.

Comments
13 min read
Secretless AI-powered development flow
Cover image for Secretless AI-powered development flow

Secretless AI-powered development flow

Comments
13 min read
SetupClaw troubleshooting playbook: webhooks, auth, rate limits, and restart incidents on Hetzner

SetupClaw troubleshooting playbook: webhooks, auth, rate limits, and restart incidents on Hetzner

Comments
4 min read
OWASP MCP Top 10: What AI Developers Need to Know in 2026

OWASP MCP Top 10: What AI Developers Need to Know in 2026

Comments
6 min read
I built a live VPN streaming monitor using WireGuard pools

I built a live VPN streaming monitor using WireGuard pools

1
Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.