DEV Community

Narnaiezzsshaa Truong profile picture

Narnaiezzsshaa Truong

Security tools for bootstrapped startups

Location Texas, United States Joined Joined on  Personal website https://www.linkedin.com/in/narnaiezzsshaa-truong
OSI Layer 4 Security Vulnerabilities & Resolutions

OSI Layer 4 Security Vulnerabilities & Resolutions

Comments
9 min read

Want to connect with Narnaiezzsshaa Truong?

Create an account to connect with Narnaiezzsshaa Truong. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

6
Comments 2
4 min read
Adversarial Thinking Template: Working Backward from the Goal

Adversarial Thinking Template: Working Backward from the Goal

6
Comments 1
2 min read
Why Your Parental Control API Will Fail: Architectural Lessons from TikTok, Roblox, and YouTube

Why Your Parental Control API Will Fail: Architectural Lessons from TikTok, Roblox, and YouTube

2
Comments 3
9 min read
Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

5
Comments 1
8 min read
Credential Optics Does Not Equal Institutional Access: Competence is Authored, Not Conferred

Credential Optics Does Not Equal Institutional Access: Competence is Authored, Not Conferred

Comments
2 min read
Beyond "The End of Cybersecurity": Refusal as Default Architecture

Beyond "The End of Cybersecurity": Refusal as Default Architecture

2
Comments 3
12 min read
I Don't Know If I'm An Expert (And That Might Be the Point)

I Don't Know If I'm An Expert (And That Might Be the Point)

28
Comments 10
5 min read
Beyond Mapping Adversarial Subspaces: Why AI Security Needs Architectural Defenses

Beyond Mapping Adversarial Subspaces: Why AI Security Needs Architectural Defenses

Comments
9 min read
Security for Bootstrapped Startups: The $0 Budget Checklist (2025)

Security for Bootstrapped Startups: The $0 Budget Checklist (2025)

1
Comments 2
10 min read
Defending AI Email Assistants Against Prompt Injection: A Forensic-First Framework

Defending AI Email Assistants Against Prompt Injection: A Forensic-First Framework

1
Comments
4 min read
Infrastructure Sovereignty and the AI-Proof Skill Stack: What the OpenAI-AWS Deal Reveals About Future-Proof Careers

Infrastructure Sovereignty and the AI-Proof Skill Stack: What the OpenAI-AWS Deal Reveals About Future-Proof Careers

Comments
7 min read
The Kitsune Protocol: Editorial Deployment of a Mythic Trickster for AI/ML Deception Logic

The Kitsune Protocol: Editorial Deployment of a Mythic Trickster for AI/ML Deception Logic

Comments
3 min read
Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Comments
3 min read
The Kali Protocol: Editorial Architecture for Refusal, Purge, and Motif Restoration

The Kali Protocol: Editorial Architecture for Refusal, Purge, and Motif Restoration

Comments
2 min read
Collapse Spectrum: Philethesia and Apatheia as Editorial Glyphs for AI/ML Systems

Collapse Spectrum: Philethesia and Apatheia as Editorial Glyphs for AI/ML Systems

Comments
2 min read
The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

Comments
3 min read
The Chim Lac Protocol: Editorial Architecture for Signal Compression and Motif Drift

The Chim Lac Protocol: Editorial Architecture for Signal Compression and Motif Drift

Comments
2 min read
The Sphinx Protocol: Encoding Ambiguity, Ascent, and Refusal in AI/ML Systems

The Sphinx Protocol: Encoding Ambiguity, Ascent, and Refusal in AI/ML Systems

Comments
3 min read
The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling

The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling

Comments
3 min read
The Janus Protocol: Strategic Duality and Leadership Dilemmas in Cybersecurity

The Janus Protocol: Strategic Duality and Leadership Dilemmas in Cybersecurity

Comments
3 min read
The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

Comments
7 min read
The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence

The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence

Comments
3 min read
The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology

The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology

2
Comments
8 min read
Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure

Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure

3
Comments
9 min read
I Built Quality Control Into an AI Tool's Architecture—Here's What It Generated

I Built Quality Control Into an AI Tool's Architecture—Here's What It Generated

10
Comments 1
11 min read
What 'Like You're Five' Security Actually Looks Like (Hint: It's Not Condescending)

What 'Like You're Five' Security Actually Looks Like (Hint: It's Not Condescending)

2
Comments
16 min read
Teaching OWASP Top 10 Through Visual Frameworks

Teaching OWASP Top 10 Through Visual Frameworks

Comments
16 min read
loading...