Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Stress Test My Digital Fortress: An eBPF + Shannon Entropy Guard (Open Sourced)
Cover image for Stress Test My Digital Fortress: An eBPF + Shannon Entropy Guard (Open Sourced)

Stress Test My Digital Fortress: An eBPF + Shannon Entropy Guard (Open Sourced)

Comments
2 min read
Preview Mode First: Agent Plans as PRs (Plan Diff + Invariants)

Preview Mode First: Agent Plans as PRs (Plan Diff + Invariants)

2
Comments
3 min read
Cost Tracking, Auth & Production Hardening
Cover image for Cost Tracking, Auth & Production Hardening

Cost Tracking, Auth & Production Hardening

2
Comments
9 min read
Your Obfuscation is Just Math to Me: An eBPF Guillotine in the Linux Kernel

Your Obfuscation is Just Math to Me: An eBPF Guillotine in the Linux Kernel

Comments
2 min read
Linux File Integrity Monitoring That Actually Works: AIDE + systemd Timer + Safe Baseline Updates

Linux File Integrity Monitoring That Actually Works: AIDE + systemd Timer + Safe Baseline Updates

Comments
4 min read
SLAG! 🛡️ an invisble layer of protection 🔒 - Part 2
Cover image for SLAG! 🛡️ an invisble layer of protection 🔒 - Part 2

SLAG! 🛡️ an invisble layer of protection 🔒 - Part 2

3
Comments
3 min read
I Built a Chat Server That Cannot Read Your Messages — Here's How

I Built a Chat Server That Cannot Read Your Messages — Here's How

1
Comments
5 min read
How to Geo-Block Countries in Express.js (Free IP Geolocation API)

How to Geo-Block Countries in Express.js (Free IP Geolocation API)

Comments
4 min read
3 OpenClaw Skills I Built in One Day (Memory, Security, and Automation)

3 OpenClaw Skills I Built in One Day (Memory, Security, and Automation)

1
Comments
4 min read
How to Verify Email Addresses in JavaScript (Without Sending Emails)

How to Verify Email Addresses in JavaScript (Without Sending Emails)

Comments
6 min read
What Is Confidential AI? The Security Gap Your Encryption Doesn’t Cover
Cover image for What Is Confidential AI? The Security Gap Your Encryption Doesn’t Cover

What Is Confidential AI? The Security Gap Your Encryption Doesn’t Cover

2
Comments
12 min read
Understanding OAuth2 Grant Types
Cover image for Understanding OAuth2 Grant Types

Understanding OAuth2 Grant Types

1
Comments 1
5 min read
Java Security

Java Security

1
Comments
14 min read
Five Events This Week Proved the Same Thing: AI Provenance Without Refusal Logs Is Half an Architecture
Cover image for Five Events This Week Proved the Same Thing: AI Provenance Without Refusal Logs Is Half an Architecture

Five Events This Week Proved the Same Thing: AI Provenance Without Refusal Logs Is Half an Architecture

Comments
23 min read
How to Build a Domain Intelligence Tool in JavaScript (DNS + Geolocation + Screenshots)

How to Build a Domain Intelligence Tool in JavaScript (DNS + Geolocation + Screenshots)

Comments
8 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.