Forem

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Ghost in the Machine: Exploiting Social Graphs with Phantom Nodes by Arvind Sundararajan

Ghost in the Machine: Exploiting Social Graphs with Phantom Nodes by Arvind Sundararajan

Comments
2 min read
Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

1
Comments
4 min read
Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)
Cover image for Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)

Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)

1
Comments
4 min read
Decoy-Hunter: Technical Enhancement for Verifiable Evidence and Stateful Protocol Probes.

Decoy-Hunter: Technical Enhancement for Verifiable Evidence and Stateful Protocol Probes.

1
Comments
6 min read
The Hidden Dangers of Overlooking Digital Hygiene in 2025
Cover image for The Hidden Dangers of Overlooking Digital Hygiene in 2025

The Hidden Dangers of Overlooking Digital Hygiene in 2025

1
Comments
2 min read
What is Customer Identity and Access Management? Benefits and Examples
Cover image for What is Customer Identity and Access Management? Benefits and Examples

What is Customer Identity and Access Management? Benefits and Examples

1
Comments
2 min read
Federated Learning's 'Zero Trust' Revolution: Secure AI for a Suspicious World

Federated Learning's 'Zero Trust' Revolution: Secure AI for a Suspicious World

Comments
2 min read
Stop Overthinking Authentication: A 3-Question Guide to Choosing JWT vs. Sessions
Cover image for Stop Overthinking Authentication: A 3-Question Guide to Choosing JWT vs. Sessions

Stop Overthinking Authentication: A 3-Question Guide to Choosing JWT vs. Sessions

1
Comments
2 min read
GenesisDB - The GDPR-ready event-sourcing database engine

GenesisDB - The GDPR-ready event-sourcing database engine

1
Comments
1 min read
📰 Major Tech News: September 27, 2025
Cover image for 📰 Major Tech News: September 27, 2025

📰 Major Tech News: September 27, 2025

21
Comments
5 min read
Ghost Nodes: Red Teaming Social Graphs for Maximum Privacy

Ghost Nodes: Red Teaming Social Graphs for Maximum Privacy

Comments
2 min read
📰 Major Tech News: September 24, 2025
Cover image for 📰 Major Tech News: September 24, 2025

📰 Major Tech News: September 24, 2025

25
Comments 4
5 min read
LLMOps Done Right: Designing Traceable, Secure AI Systems for Production
Cover image for LLMOps Done Right: Designing Traceable, Secure AI Systems for Production

LLMOps Done Right: Designing Traceable, Secure AI Systems for Production

Comments
3 min read
Why Developers Should Care About Access Control

Why Developers Should Care About Access Control

Comments
4 min read
Privacy-Preserving AI: 7 Techniques to Protect Training Data in Cloud AI Systems

Privacy-Preserving AI: 7 Techniques to Protect Training Data in Cloud AI Systems

Comments
8 min read
Masking Sensitive Data in CloudWatch Logs for APIs (and keeping your secrets safe!)
Cover image for Masking Sensitive Data in CloudWatch Logs for APIs (and keeping your secrets safe!)

Masking Sensitive Data in CloudWatch Logs for APIs (and keeping your secrets safe!)

2
Comments
4 min read
Cloak and Swagger: Hiding in Plain Sight on Social Networks

Cloak and Swagger: Hiding in Plain Sight on Social Networks

1
Comments
2 min read
📰 Major Tech News: September 26, 2025
Cover image for 📰 Major Tech News: September 26, 2025

📰 Major Tech News: September 26, 2025

20
Comments 1
5 min read
The Digital Ghost: Cloaking Influence in Social Networks

The Digital Ghost: Cloaking Influence in Social Networks

Comments
2 min read
System Design Basics: Scalability vs Performance vs Security

System Design Basics: Scalability vs Performance vs Security

Comments
3 min read
## 🧅 Inside Tor: A Simplified Look at Its Architecture and Code Organization
Cover image for ## 🧅 Inside Tor: A Simplified Look at Its Architecture and Code Organization

## 🧅 Inside Tor: A Simplified Look at Its Architecture and Code Organization

Comments
3 min read
Exploring Claude's Quirks: Bugs, Laughs, and Transparency | Anthropic AI
Cover image for Exploring Claude's Quirks: Bugs, Laughs, and Transparency | Anthropic AI

Exploring Claude's Quirks: Bugs, Laughs, and Transparency | Anthropic AI

6
Comments
3 min read
Building a CLI for the Ecosyste.ms API

Building a CLI for the Ecosyste.ms API

Comments
3 min read
📰 Major Tech News: September 25, 2025
Cover image for 📰 Major Tech News: September 25, 2025

📰 Major Tech News: September 25, 2025

19
Comments 2
6 min read
Fort Knox Federated Learning: Next-Gen Security Tactics

Fort Knox Federated Learning: Next-Gen Security Tactics

Comments
2 min read
loading...