Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Why I Stopped Using LocalStorage for Auth and What You Should Do Instead
Cover image for Why I Stopped Using LocalStorage for Auth and What You Should Do Instead

Why I Stopped Using LocalStorage for Auth and What You Should Do Instead

2
Comments
7 min read
Self-Sovereign Identity's Privacy Blind Spot: Why DIDs Need Confidential Computing

Self-Sovereign Identity's Privacy Blind Spot: Why DIDs Need Confidential Computing

6
Comments 3
3 min read
Software Testing, Mock Objects, & Test Isolation: Implementasi Teknik Lanjutan pada Modul Reply

Software Testing, Mock Objects, & Test Isolation: Implementasi Teknik Lanjutan pada Modul Reply

Comments
18 min read
The Silent Breach: Why Most Developers Still Underestimate Cybersecurity

The Silent Breach: Why Most Developers Still Underestimate Cybersecurity

Comments
2 min read
Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)
Cover image for Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)

Remote Code Execution via Profile Picture Upload on Academico (CVE-2025-10763)

Comments
4 min read
Setup GitHub SSH Access on a Machine

Setup GitHub SSH Access on a Machine

Comments
1 min read
Industries Where Your C Code Saves Lives (And They're Hiring)
Cover image for Industries Where Your C Code Saves Lives (And They're Hiring)

Industries Where Your C Code Saves Lives (And They're Hiring)

Comments 7
8 min read
debug cr

debug cr

Comments
1 min read
EU CRA: 12-Month Dev Roadmap for SBOM & Vulnerabilities (DEV-oriented)
Cover image for EU CRA: 12-Month Dev Roadmap for SBOM & Vulnerabilities (DEV-oriented)

EU CRA: 12-Month Dev Roadmap for SBOM & Vulnerabilities (DEV-oriented)

2
Comments
7 min read
The Dark Art Of Behavioral Enumeration And Why It Works Every Time
Cover image for The Dark Art Of Behavioral Enumeration And Why It Works Every Time

The Dark Art Of Behavioral Enumeration And Why It Works Every Time

5
Comments
7 min read
Cryptography: The Hidden Engine Powering Web3
Cover image for Cryptography: The Hidden Engine Powering Web3

Cryptography: The Hidden Engine Powering Web3

Comments
2 min read
Secrets Management: Vault, AWS Secrets Manager, or SOPS?

Secrets Management: Vault, AWS Secrets Manager, or SOPS?

Comments
11 min read
Take Control: The Best Cloud Storage Alternatives to Own Your Files
Cover image for Take Control: The Best Cloud Storage Alternatives to Own Your Files

Take Control: The Best Cloud Storage Alternatives to Own Your Files

Comments
4 min read
Beyond Code: The Obsessive Knowledge That Makes You Dangerous
Cover image for Beyond Code: The Obsessive Knowledge That Makes You Dangerous

Beyond Code: The Obsessive Knowledge That Makes You Dangerous

1
Comments
9 min read
AWS IAM Outbound OIDC with Google Cloud Identity Pool
Cover image for AWS IAM Outbound OIDC with Google Cloud Identity Pool

AWS IAM Outbound OIDC with Google Cloud Identity Pool

1
Comments
10 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.