<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Gambino</title>
    <description>The latest articles on DEV Community by Gambino (@gambino).</description>
    <link>https://dev.to/gambino</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3701915%2F156791f6-222e-4f28-9700-145aa001ebfb.jpg</url>
      <title>DEV Community: Gambino</title>
      <link>https://dev.to/gambino</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/gambino"/>
    <language>en</language>
    <item>
      <title>Hardware Isolation for Data Security-PlugMate. Any Alternatives?</title>
      <dc:creator>Gambino</dc:creator>
      <pubDate>Wed, 04 Mar 2026 07:29:30 +0000</pubDate>
      <link>https://dev.to/gambino/hardware-isolation-for-data-security-plugmate-any-alternatives-38n1</link>
      <guid>https://dev.to/gambino/hardware-isolation-for-data-security-plugmate-any-alternatives-38n1</guid>
      <description>&lt;p&gt;I work in finance, and most of my day revolves around handling clients’ private financial data. If this kind of information ever leaks, the impact goes far beyond one individual — it directly affects client trust and can create serious compliance issues for the company. Because of that, I’ve constantly been exploring different ways to store and manage sensitive data more securely.&lt;br&gt;
Over the years, I’ve used quite a few encrypted USB drives — hardware AES encryption, fingerprint unlock, dual authentication. From a pure storage-security standpoint, they do their job well. But there’s always one unavoidable issue: at some point, you still have to copy the files onto a computer to edit, search, or process them.&lt;br&gt;
And that’s where the real risk starts — once the data lands on a machine. As you open files on the computer, the system may generate cache files, temp files, or logs. Even if you try to clean everything afterward, there’s always concerns that one day you might forget to completely remove those traces.&lt;br&gt;
Recently, I came across a product called PlugMate and decided to try it out. It’s not just a regular USB drive — it’s actually a standalone device that runs its own operating system. That means storage and processing both happen inside the device itself. The data never leaves the device, so nothing gets written to the host computer. No local copies, no leftover traces.&lt;br&gt;
It actually reminds me of Windows To Go back in the day — although Microsoft no longer supports it. From what I’ve seen so far, hardware-level isolation seems like one of the most practical ways to reduce this kind of risk.&lt;br&gt;
Curious to hear from others in similar roles — what are you using to avoid leaving data traces on host machines?&lt;/p&gt;

</description>
      <category>security</category>
      <category>mobile</category>
      <category>privacy</category>
      <category>date</category>
    </item>
    <item>
      <title>Exploring a hardware-isolated OS shown at CES 2026</title>
      <dc:creator>Gambino</dc:creator>
      <pubDate>Wed, 14 Jan 2026 10:16:16 +0000</pubDate>
      <link>https://dev.to/gambino/exploring-a-hardware-isolated-os-shown-at-ces-2026-m9i</link>
      <guid>https://dev.to/gambino/exploring-a-hardware-isolated-os-shown-at-ces-2026-m9i</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foqawsxpohw0azs8h66yt.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foqawsxpohw0azs8h66yt.jpg" alt=" " width="800" height="562"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;While browsing CES 2026 announcements, I came across an interesting systems design: a USB-sized device that runs a full operating system on the hardware itself.&lt;/p&gt;

&lt;p&gt;Instead of using a VM or container, the OS executes entirely on the device. When plugged into a phone or PC, the host only provides display and input. There’s no cloud dependency by default, and the trust boundary is shifted away from the host OS.&lt;/p&gt;

&lt;p&gt;This raises some questions from an engineering perspective:&lt;/p&gt;

&lt;p&gt;How would you evaluate the attack surface compared to VM-based isolation?&lt;/p&gt;

&lt;p&gt;Where do performance and I/O become bottlenecks?&lt;/p&gt;

&lt;p&gt;In what scenarios would this be meaningfully better than a hardened host OS?&lt;/p&gt;

&lt;p&gt;I’m less interested in the product itself and more in the architectural tradeoffs this approach highlights.&lt;/p&gt;

&lt;p&gt;(Background link from CES: &lt;a href="https://plugos.net/news/2026/01/08/plugos-at-ces.html" rel="noopener noreferrer"&gt;https://plugos.net/news/2026/01/08/plugos-at-ces.html&lt;/a&gt;&lt;br&gt;
)&lt;/p&gt;

</description>
      <category>architecture</category>
      <category>discuss</category>
      <category>security</category>
    </item>
  </channel>
</rss>
