Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
SVG files are everywhere — icons, logos, illustrations, UI graphics...

SVG files are everywhere — icons, logos, illustrations, UI graphics...

1
Comments
2 min read
LeafWiki Devlog #8: v0.7.3 - Secure by Default: Authentication, Roles & Safer Self-Hosting

LeafWiki Devlog #8: v0.7.3 - Secure by Default: Authentication, Roles & Safer Self-Hosting

Comments
3 min read
Why Permission Boundary Didn’t Restrict AmazonEC2FullAccess — Complete AWS IAM Debugging Guide

Why Permission Boundary Didn’t Restrict AmazonEC2FullAccess — Complete AWS IAM Debugging Guide

2
Comments
3 min read
Implementing Certificate Pinning in .NET: A Step-by-Step Guide
Cover image for Implementing Certificate Pinning in .NET: A Step-by-Step Guide

Implementing Certificate Pinning in .NET: A Step-by-Step Guide

Comments
3 min read
How to Clone a GitLab Repository with a Self-Signed Certificate

How to Clone a GitLab Repository with a Self-Signed Certificate

Comments
3 min read
Dual Critical Failures: RCE & DNS Exfiltration in ChatGPT Canvas

Dual Critical Failures: RCE & DNS Exfiltration in ChatGPT Canvas

Comments
1 min read
Stop / Delay / Block: a minimal execution safety gate (30-second demo)
Cover image for Stop / Delay / Block: a minimal execution safety gate (30-second demo)

Stop / Delay / Block: a minimal execution safety gate (30-second demo)

Comments
2 min read
VeraSnap Building a Cryptographic Evidence Capture App for Android with Kotlin, CameraX, and Hardware-Backed Security
Cover image for VeraSnap Building a Cryptographic Evidence Capture App for Android with Kotlin, CameraX, and Hardware-Backed Security

VeraSnap Building a Cryptographic Evidence Capture App for Android with Kotlin, CameraX, and Hardware-Backed Security

Comments
13 min read
Ultimate Guide: How to Secure a Flutter App (OWASP Mobile Top 10 + Checklist)
Cover image for Ultimate Guide: How to Secure a Flutter App (OWASP Mobile Top 10 + Checklist)

Ultimate Guide: How to Secure a Flutter App (OWASP Mobile Top 10 + Checklist)

Comments
8 min read
Salt, Pepper, and Secret Sauce: The Recipe for Uncrackable Passwords
Cover image for Salt, Pepper, and Secret Sauce: The Recipe for Uncrackable Passwords

Salt, Pepper, and Secret Sauce: The Recipe for Uncrackable Passwords

3
Comments
9 min read
I built an open-source SBOM dashboard to track vulnerabilities across all my projects
Cover image for I built an open-source SBOM dashboard to track vulnerabilities across all my projects

I built an open-source SBOM dashboard to track vulnerabilities across all my projects

Comments
2 min read
Implementing sudo for LLMs: A Middleware Approach to AI Security
Cover image for Implementing sudo for LLMs: A Middleware Approach to AI Security

Implementing sudo for LLMs: A Middleware Approach to AI Security

Comments
3 min read
We tested 5 AI commit-message skills on security. 3 made things worse.

We tested 5 AI commit-message skills on security. 3 made things worse.

Comments
4 min read
I built a simple CLI to sync .env files securely (E2EE) 🌸
Cover image for I built a simple CLI to sync .env files securely (E2EE) 🌸

I built a simple CLI to sync .env files securely (E2EE) 🌸

Comments
1 min read
We replaced reCAPTCHA and haven't looked back

We replaced reCAPTCHA and haven't looked back

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.