Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Digitally Sign Any File in Your Browser: Without Uploading Files or Installing Software — 100% Local, Private, and Secure.

Digitally Sign Any File in Your Browser: Without Uploading Files or Installing Software — 100% Local, Private, and Secure.

1
Comments
2 min read
Building Decentralized Architectures with Web3 and Symfony 7.4
Cover image for Building Decentralized Architectures with Web3 and Symfony 7.4

Building Decentralized Architectures with Web3 and Symfony 7.4

5
Comments 1
7 min read
Implementing Threshold Cryptography: Why We Ditched Standard PKI for MPC at SQHWYD
Cover image for Implementing Threshold Cryptography: Why We Ditched Standard PKI for MPC at SQHWYD

Implementing Threshold Cryptography: Why We Ditched Standard PKI for MPC at SQHWYD

5
Comments
2 min read
Microsoft и GitHub представили инструмент для устранения уязвимостей с помощью ИИ

Microsoft и GitHub представили инструмент для устранения уязвимостей с помощью ИИ

Comments
1 min read
Spotting Danger Before It Strikes: AI for Smarter, Safer Traffic by Arvind Sundararajan

Spotting Danger Before It Strikes: AI for Smarter, Safer Traffic by Arvind Sundararajan

1
Comments
2 min read
Rust CI: Security, Dependency Policy, Coverage Gate, and Fast Builds
Cover image for Rust CI: Security, Dependency Policy, Coverage Gate, and Fast Builds

Rust CI: Security, Dependency Policy, Coverage Gate, and Fast Builds

Comments
1 min read
Erase Faces, Not Utility: Instant Privacy for Image AI by Arvind Sundararajan

Erase Faces, Not Utility: Instant Privacy for Image AI by Arvind Sundararajan

1
Comments
2 min read
Building a Zero-Trust Security Gateway for Local AI

Building a Zero-Trust Security Gateway for Local AI

Comments
2 min read
Key Lessons From the Bitcoin Whitepaper

Key Lessons From the Bitcoin Whitepaper

Comments
3 min read
EP 3: The .env Disaster: Why Your App is a Ticking Time Bomb (and How to Fix It)

EP 3: The .env Disaster: Why Your App is a Ticking Time Bomb (and How to Fix It)

1
Comments
2 min read
Why the Directory Is the Core of IAM: The Digital Heartbeat of Every Organization

Why the Directory Is the Core of IAM: The Digital Heartbeat of Every Organization

Comments
3 min read
The Startup Checklist for Picking a Mobile App Dev Partner
Cover image for The Startup Checklist for Picking a Mobile App Dev Partner

The Startup Checklist for Picking a Mobile App Dev Partner

Comments
4 min read
Designing RBAC for AI agents

Designing RBAC for AI agents

Comments
13 min read
The LLM Shield: How to Build Production-Grade NSFW Guardrails for AI Agents

The LLM Shield: How to Build Production-Grade NSFW Guardrails for AI Agents

1
Comments
4 min read
🔐 Modernizing Legacy: Implementing OAuth2 in Uniface for Outlook & Gmail

🔐 Modernizing Legacy: Implementing OAuth2 in Uniface for Outlook & Gmail

Comments
3 min read
LavinHash: Engineering Similarity - A Technical Dissection
Cover image for LavinHash: Engineering Similarity - A Technical Dissection

LavinHash: Engineering Similarity - A Technical Dissection

12
Comments
5 min read
Spring Security Flow

Spring Security Flow

Comments
1 min read
Serverless Student Management System (AWS)
Cover image for Serverless Student Management System (AWS)

Serverless Student Management System (AWS)

1
Comments
2 min read
OSI Layer 4 Security Vulnerabilities & Resolutions
Cover image for OSI Layer 4 Security Vulnerabilities & Resolutions

OSI Layer 4 Security Vulnerabilities & Resolutions

Comments
9 min read
A Guide to Production-Ready Security, Logging and Architecture in the express app

A Guide to Production-Ready Security, Logging and Architecture in the express app

Comments
4 min read
AI coding agents can run rm -rf / on your machine. Here's how to stop them

AI coding agents can run rm -rf / on your machine. Here's how to stop them

Comments
2 min read
Human vs. Machine Cognition: Brains, Minds, and Meaning
Cover image for Human vs. Machine Cognition: Brains, Minds, and Meaning

Human vs. Machine Cognition: Brains, Minds, and Meaning

Comments
3 min read
JWT Is Not Secure — Until You Understand JWS and JWE
Cover image for JWT Is Not Secure — Until You Understand JWS and JWE

JWT Is Not Secure — Until You Understand JWS and JWE

5
Comments
3 min read
"Fuck-Jails" payload vault for Python / C (JS, Ruby, Bash, PHP, C++ coming) | feedback welcome
Cover image for "Fuck-Jails" payload vault for Python / C (JS, Ruby, Bash, PHP, C++ coming) | feedback welcome

"Fuck-Jails" payload vault for Python / C (JS, Ruby, Bash, PHP, C++ coming) | feedback welcome

Comments
2 min read
Building Own Block Cipher: Part 3 - AES
Cover image for Building Own Block Cipher: Part 3 - AES

Building Own Block Cipher: Part 3 - AES

Comments
6 min read
loading...