<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Vincent Narbot</title>
    <description>The latest articles on DEV Community by Vincent Narbot (@vincentnarbot).</description>
    <link>https://dev.to/vincentnarbot</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2101069%2Faa2e395a-5249-4232-9b02-175bad4439f0.jpeg</url>
      <title>DEV Community: Vincent Narbot</title>
      <link>https://dev.to/vincentnarbot</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/vincentnarbot"/>
    <language>en</language>
    <item>
      <title>The End of the "I Am Not a Robot" Box: Why Your Next Login Will Require 5 Squats</title>
      <dc:creator>Vincent Narbot</dc:creator>
      <pubDate>Wed, 01 Apr 2026 06:34:00 +0000</pubDate>
      <link>https://dev.to/vincentnarbot/the-end-of-the-i-am-not-a-robot-box-why-your-next-login-will-require-5-squats-5d11</link>
      <guid>https://dev.to/vincentnarbot/the-end-of-the-i-am-not-a-robot-box-why-your-next-login-will-require-5-squats-5d11</guid>
      <description>&lt;h2&gt;
  
  
  Why physical verification is the final frontier of cybersecurity.
&lt;/h2&gt;

&lt;p&gt;For twenty years, we’ve been clicking on traffic lights, buses, and fire hydrants to prove we’re human. We’ve collectively spent billions of hours training AI models for free, only for those same models to become better at solving CAPTCHAs than we are.&lt;/p&gt;

&lt;p&gt;In 2026, the "I am not a robot" checkbox is officially dead. If a bot can pass the Bar Exam, it can certainly find a crosswalk in a grainy photo.&lt;/p&gt;

&lt;p&gt;So, how do we solve the "Dead Internet Theory" while simultaneously tackling the "Sitting Disease" of the modern workforce?&lt;/p&gt;

&lt;p&gt;Introducing HealthCAPTCHA: The world’s first security protocol based on Physical Verification.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Cognitive Compromise
&lt;/h2&gt;

&lt;p&gt;Traditional CAPTCHAs rely on cognitive work. But in the age of Generative AI, cognitive effort is cheap. Scripts can now mimic human click-patterns and solve recognition puzzles in milliseconds.&lt;/p&gt;

&lt;p&gt;The only thing an AI cannot do is exist in the physical realm. It has no metabolism. It cannot feel the burn of a deep squat.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F67anwjmtq24ej4kzl4o3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F67anwjmtq24ej4kzl4o3.png" alt="HealthCAPTCHA by Formidable Care" width="620" height="968"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  How It Works
&lt;/h2&gt;

&lt;p&gt;At HealthCAPTCHA.com, we’ve shifted the verification layer from the screen to the floor. To access a protected site, a user must perform 5 squats in front of their webcam.&lt;/p&gt;

&lt;p&gt;Our protocol doesn't just look for a face; it verifies humanity through kinetic movement. If you don't hit parallel, you don't get the password. It’s a physical firewall that makes automated scripts physically impossible.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Health Advantage
&lt;/h2&gt;

&lt;p&gt;This isn't just about stopping spam. The average knowledge worker solves multiple CAPTCHAs a day. By turning those into 5-rep sets, we are turning a digital hurdle into a circulation-boosting micro-break.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Future is Physical
&lt;/h2&gt;

&lt;p&gt;As we move into a world dominated by silicon intelligence, our biological reality is our greatest security asset. The era of the sedentary internet is over.&lt;/p&gt;

&lt;p&gt;Kill spam. Skip the gym. You’re welcome.&lt;/p&gt;

&lt;p&gt;→ &lt;a href="https://healthCAPTCHA.com" rel="noopener noreferrer"&gt;HealthCAPTCHA.com&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;Every day we focus on healthcare interoperability and continuity of care. But sometimes we forget that small steps, taken every day, can have a big impact on your health over time. At &lt;a href="https://formidable.care" rel="noopener noreferrer"&gt;Formidable Care&lt;/a&gt;, we believe that anything that makes your care more formidable matters. Even five squats.&lt;/p&gt;

&lt;p&gt;Happy and Healthy April Fools Day.&lt;/p&gt;

</description>
      <category>ai</category>
      <category>captcha</category>
      <category>cybersecurity</category>
      <category>healthcare</category>
    </item>
    <item>
      <title>Why digital signatures break on structured healthcare data</title>
      <dc:creator>Vincent Narbot</dc:creator>
      <pubDate>Fri, 23 Jan 2026 10:23:06 +0000</pubDate>
      <link>https://dev.to/vincentnarbot/why-digital-signatures-break-on-structured-healthcare-data-4if9</link>
      <guid>https://dev.to/vincentnarbot/why-digital-signatures-break-on-structured-healthcare-data-4if9</guid>
      <description>&lt;p&gt;Digital signatures are often treated as a solved problem. In practice, most systems solve &lt;strong&gt;identity&lt;/strong&gt;, not &lt;strong&gt;integrity&lt;/strong&gt;, and the distinction becomes critical once signatures are applied to structured data rather than static documents.&lt;/p&gt;

&lt;p&gt;Healthcare is a good example, but the issue is not healthcare-specific. Any system that signs structured, interoperable data eventually runs into the same failure mode.&lt;/p&gt;

&lt;p&gt;This post explains why that happens and what a correct signing architecture looks like.&lt;/p&gt;




&lt;h2&gt;
  
  
  A real-world failure scenario
&lt;/h2&gt;

&lt;p&gt;Consider a common workflow:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;A system generates a prescription encoded as structured data (for example, JSON).&lt;/li&gt;
&lt;li&gt;A clinician signs it.&lt;/li&gt;
&lt;li&gt;The data is transmitted to another system.&lt;/li&gt;
&lt;li&gt;The receiving system re-serializes the payload:

&lt;ul&gt;
&lt;li&gt;Fields are reordered
&lt;/li&gt;
&lt;li&gt;Optional fields are omitted
&lt;/li&gt;
&lt;li&gt;Formatting and whitespace change&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Signature verification fails.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;No semantic meaning changed.&lt;br&gt;&lt;br&gt;
No malicious modification occurred.&lt;/p&gt;

&lt;p&gt;Yet cryptographically, the document is no longer identical.&lt;/p&gt;

&lt;p&gt;This is not a bug. It is the expected outcome of signing &lt;strong&gt;non-canonical structured data&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  Identity is not integrity
&lt;/h2&gt;

&lt;p&gt;Any serious signing system must answer two different questions:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Who signed this?&lt;/li&gt;
&lt;li&gt;Exactly what did they sign?&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Most e-signature systems focus heavily on the first question:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Authentication
&lt;/li&gt;
&lt;li&gt;Identity proofing
&lt;/li&gt;
&lt;li&gt;Audit logs
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;They often answer the second question implicitly by signing a particular file representation, assuming that representation is stable over time.&lt;/p&gt;

&lt;p&gt;That assumption holds for PDFs.&lt;br&gt;&lt;br&gt;
It fails for structured data.&lt;/p&gt;

&lt;p&gt;Cryptographic signatures are binary-exact.&lt;br&gt;&lt;br&gt;
Structured data is not.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why structured data breaks naive signing models
&lt;/h2&gt;

&lt;p&gt;Structured data is routinely:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Stored in databases rather than files
&lt;/li&gt;
&lt;li&gt;Regenerated on demand
&lt;/li&gt;
&lt;li&gt;Transformed across APIs
&lt;/li&gt;
&lt;li&gt;Normalized or enriched downstream
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Two semantically identical objects can have multiple valid binary representations. A signature over one representation will not verify against another.&lt;/p&gt;

&lt;p&gt;Without additional guarantees, signing structured data amounts to signing a transient serialization artifact rather than the underlying meaning.&lt;/p&gt;

&lt;p&gt;That is not a durable proof.&lt;/p&gt;




&lt;h2&gt;
  
  
  Interoperability makes integrity unavoidable
&lt;/h2&gt;

&lt;p&gt;As &lt;a href="https://formidable.care/glossary/healthcare-interoperability" rel="noopener noreferrer"&gt;interoperability&lt;/a&gt; increases (for example, through &lt;a href="https://formidable.care/glossary/Fast-Healthcare-Interoperability-Resources" rel="noopener noreferrer"&gt;FHIR&lt;/a&gt; in healthcare), systems exchange &lt;strong&gt;meaningful data&lt;/strong&gt;, not frozen documents.&lt;/p&gt;

&lt;p&gt;In this environment:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Data crosses organizational boundaries
&lt;/li&gt;
&lt;li&gt;Content is transformed and re-emitted
&lt;/li&gt;
&lt;li&gt;Long-term verification matters
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Connectivity without cryptographic integrity guarantees creates a false sense of trust. Systems can exchange data, but they cannot reliably prove that the data they consume is the data that was approved.&lt;/p&gt;




&lt;h2&gt;
  
  
  A signing architecture that preserves integrity
&lt;/h2&gt;

&lt;p&gt;Closing this gap requires making the signed object &lt;strong&gt;deterministic&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;A robust architecture consists of three explicit steps.&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Canonicalization
&lt;/h3&gt;

&lt;p&gt;Convert flexible structured data into a deterministic representation:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Stable field ordering
&lt;/li&gt;
&lt;li&gt;Normalized data types
&lt;/li&gt;
&lt;li&gt;Removal of non-semantic noise
&lt;/li&gt;
&lt;li&gt;Versioned canonicalization rules
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Semantically identical data must produce identical bytes.&lt;/p&gt;




&lt;h3&gt;
  
  
  2. Fingerprinting
&lt;/h3&gt;

&lt;p&gt;Hash the canonical representation using a collision-resistant algorithm.&lt;/p&gt;

&lt;p&gt;This produces a fixed-length fingerprint that uniquely represents the content and changes completely if the meaning changes.&lt;/p&gt;

&lt;p&gt;At this point, integrity is mathematically defined.&lt;/p&gt;




&lt;h3&gt;
  
  
  3. Signature
&lt;/h3&gt;

&lt;p&gt;Sign the fingerprint, not the raw document.&lt;/p&gt;

&lt;p&gt;This binds a signer’s identity to a precise, reproducible representation of the data. Anyone with the public key, the canonicalization rules, and the data can independently verify the signature.&lt;/p&gt;

&lt;p&gt;No vendor trust required.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why document-centric models fall short
&lt;/h2&gt;

&lt;p&gt;Document-based signing works by freezing content into a visual artifact. Structured data systems do the opposite: they keep data queryable, transformable, and alive.&lt;/p&gt;

&lt;p&gt;Applying document-centric integrity models to structured data is a category error.&lt;/p&gt;

&lt;p&gt;The correct abstraction is not “sign the file.”&lt;br&gt;&lt;br&gt;
It is &lt;strong&gt;“sign the meaning.”&lt;/strong&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  TLDR;
&lt;/h2&gt;

&lt;p&gt;Digital signature systems were largely designed for documents, not interoperable data.&lt;/p&gt;

&lt;p&gt;As systems become more connected, this mismatch surfaces as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Failed signature verification
&lt;/li&gt;
&lt;li&gt;Fragile audit trails
&lt;/li&gt;
&lt;li&gt;Legal ambiguity
&lt;/li&gt;
&lt;li&gt;Compliance theater
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Closing the gap does not require exotic cryptography. It requires discipline: canonicalization, fingerprinting, and explicit binding between identity and meaning.&lt;/p&gt;

&lt;p&gt;If a signature cannot survive serialization, transport, and regeneration, it does not prove what it claims to prove.&lt;/p&gt;




&lt;h4&gt;
  
  
  Disclosure
&lt;/h4&gt;

&lt;p&gt;I work at &lt;a href="https://formidable.care" rel="noopener noreferrer"&gt;Formidable Care&lt;/a&gt;, where we are building Israel’s national digital prescription infrastructure. As interoperability increases, integrity becomes a collective responsibility, not a vendor-specific detail.&lt;/p&gt;

</description>
      <category>healthcare</category>
      <category>fhir</category>
      <category>interopability</category>
      <category>architecture</category>
    </item>
    <item>
      <title>Building Formisoft: AI-Powered Client Intake Forms with Compliance at the Core</title>
      <dc:creator>Vincent Narbot</dc:creator>
      <pubDate>Fri, 20 Sep 2024 09:19:58 +0000</pubDate>
      <link>https://dev.to/vincentnarbot/building-formisoft-ai-powered-client-intake-forms-with-compliance-at-the-core-2p0l</link>
      <guid>https://dev.to/vincentnarbot/building-formisoft-ai-powered-client-intake-forms-with-compliance-at-the-core-2p0l</guid>
      <description>&lt;p&gt;When building a business, one of the most critical components is efficient client onboarding and information management. As industries continue to evolve, so do the technologies that support them. Enter &lt;strong&gt;&lt;a href="https://formisoft.com" rel="noopener noreferrer"&gt;Formisoft&lt;/a&gt;&lt;/strong&gt;—a platform designed to simplify the client intake process while ensuring that businesses remain secure and compliant in their data handling.&lt;/p&gt;

&lt;p&gt;In this blog post, I’ll walk you through the tech stack and philosophy behind Formisoft, and how it aims to revolutionize the client intake form process for businesses.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Problem: Inefficient, Paper-Based Intake Systems
&lt;/h2&gt;

&lt;p&gt;Many businesses still rely on outdated, paper-based methods to collect client information, which can lead to several inefficiencies:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Data entry errors&lt;/li&gt;
&lt;li&gt;Time-consuming manual processes&lt;/li&gt;
&lt;li&gt;Lack of integration with modern systems&lt;/li&gt;
&lt;li&gt;Security vulnerabilities due to physical data handling&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This creates a disconnect between the potential of modern business systems and the actual workflows many companies still depend on.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Solution: Formisoft
&lt;/h2&gt;

&lt;p&gt;Formisoft was born out of the need to provide businesses with a &lt;strong&gt;secure, compliant, and efficient&lt;/strong&gt; way to manage their client intake processes. By using &lt;strong&gt;AI-powered&lt;/strong&gt; tools, we’ve developed a platform that not only simplifies form creation but also enhances the client experience, ensuring seamless data collection and integration with existing systems.&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Features
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;AI-Powered Form Creation&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
With Formisoft, businesses can create custom forms with the help of AI, streamlining the process of gathering client information. Our platform also allows the conversion of traditional paper forms into &lt;strong&gt;digital formats&lt;/strong&gt;, making the transition to a paperless system easy and accessible.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Secure and Compliant&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Data security and compliance are at the heart of Formisoft. We ensure that all forms are built with &lt;strong&gt;compliance in mind&lt;/strong&gt;, adhering to industry regulations like GDPR, HIPAA, and others. This ensures that your business not only collects data efficiently but does so securely, safeguarding client information.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Integration with Existing Systems&lt;/strong&gt;&lt;br&gt;&lt;br&gt;
Formisoft seamlessly integrates with your existing systems, meaning that client data is collected and immediately integrated into your workflows. This minimizes the need for manual entry and ensures that your team can focus on what matters most: providing excellent client service.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Tech Stack Overview
&lt;/h2&gt;

&lt;p&gt;Here’s a breakdown of the tech stack we used to bring Formisoft to life:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Next.js&lt;/strong&gt;: The backbone of our platform, giving us the flexibility and scalability needed to build a modern web app.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Auth0&lt;/strong&gt;: Ensures secure authentication, making sure only authorized personnel can access and manage sensitive client information.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Netlify&lt;/strong&gt;: We rely on Netlify for continuous integration and deployment, ensuring a smooth experience for both development and operations.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Stripe&lt;/strong&gt;: For handling payments securely and efficiently, we’ve integrated Stripe to manage subscriptions and billing.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Tailwind CSS&lt;/strong&gt;: Provides a clean, modern, and customizable design, ensuring a smooth user experience for both clients and businesses.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Claude Opus / Sonnet&lt;/strong&gt;: Our AI-driven tools that power the intelligent form creation process, helping businesses build custom forms with ease.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Why We Chose This Stack
&lt;/h2&gt;

&lt;p&gt;At the heart of &lt;a href="https://formisoft.com" rel="noopener noreferrer"&gt;Formisoft&lt;/a&gt;'s development is the idea of &lt;strong&gt;speed&lt;/strong&gt; and &lt;strong&gt;security&lt;/strong&gt;. We wanted a platform that would enable us to iterate quickly while maintaining the highest standards of data protection. Here’s why each technology was chosen:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Next.js&lt;/strong&gt;: It’s ideal for server-side rendering and static site generation, which offers performance benefits and scalability as we grow the platform.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Auth0&lt;/strong&gt;: A powerful solution that handles user authentication securely, without adding complexity to our codebase.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Netlify&lt;/strong&gt;: Their serverless capabilities and ease of deployment align perfectly with our goal of having a highly scalable infrastructure.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Stripe&lt;/strong&gt;: For a business like ours, having a trusted and secure payment gateway is non-negotiable. Stripe’s API and documentation are top-notch, making it easy to integrate.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Tailwind CSS&lt;/strong&gt;: Clean, fast, and minimal—just what we needed for a modern, responsive user interface.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Claude Opus / Sonnet&lt;/strong&gt;: These AI technologies enable businesses to create forms more efficiently, reducing the friction that often comes with building customized client intake forms.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  The Future of Form Building
&lt;/h2&gt;

&lt;p&gt;Formisoft is more than just a form builder; it's a complete solution that enables businesses to move from inefficient, paper-based systems to &lt;strong&gt;digitally-driven, AI-powered&lt;/strong&gt; ones. As we continue to develop the platform, we’re focusing on creating a comprehensive library of industry-specific templates that businesses can easily customize and deploy.&lt;/p&gt;

&lt;p&gt;Our vision is to become the go-to platform for &lt;strong&gt;secure, compliant&lt;/strong&gt;, and AI-enhanced form creation, ensuring that businesses can focus on growth, while we handle the rest.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://formisoft.com" rel="noopener noreferrer"&gt;Try it out @ formisoft.com&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
