DEV Community

Narnaiezzsshaa Truong profile picture

Narnaiezzsshaa Truong

Security tools for bootstrapped startups

Location Texas, United States Joined Joined on  Personal website https://www.linkedin.com/in/narnaiezzsshaa-truong
Hero's Journey Security Assessment API—Mythological Framework Meets SMB Cybersecurity

Xano AI-Powered Backend Challenge: Public API Submission

Hero's Journey Security Assessment API—Mythological Framework Meets SMB Cybersecurity

1
Comments
5 min read

Want to connect with Narnaiezzsshaa Truong?

Create an account to connect with Narnaiezzsshaa Truong. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
A Company Spam-Commented on My Article About Performative Expertise—And Proved My Point

A Company Spam-Commented on My Article About Performative Expertise—And Proved My Point

Comments
5 min read
Emotional Indicators of Compromise: A New Frontier in Security Awareness

Emotional Indicators of Compromise: A New Frontier in Security Awareness

Comments 1
3 min read
Dual-Use Mythological Frameworks: How Narada Encodes Both Attack and Defense in AI/ML Security

Dual-Use Mythological Frameworks: How Narada Encodes Both Attack and Defense in AI/ML Security

Comments
5 min read
The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift

The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift

Comments
2 min read
The Ravana Protocol: Encoding Multi-Agent Orchestration and Model Stacking in AI/ML Systems

The Ravana Protocol: Encoding Multi-Agent Orchestration and Model Stacking in AI/ML Systems

Comments 1
3 min read
The Equalizer and the Integrator: AI, Cybersecurity, and the Human Insight Imperative

The Equalizer and the Integrator: AI, Cybersecurity, and the Human Insight Imperative

5
Comments
5 min read
The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

3
Comments 2
4 min read
When Mastery Gets Flagged: AI Detectors, False Positives, and the Inversion of Trust

When Mastery Gets Flagged: AI Detectors, False Positives, and the Inversion of Trust

5
Comments 4
2 min read
Beyond Filters: Rearchitecting Prompt Injection Defense

Beyond Filters: Rearchitecting Prompt Injection Defense

Comments
5 min read
When Noise Becomes Motif: Defending Originality in the Age of Opportunistic Attention

When Noise Becomes Motif: Defending Originality in the Age of Opportunistic Attention

Comments
6 min read
OSI Layer 4 Security Vulnerabilities & Resolutions

OSI Layer 4 Security Vulnerabilities & Resolutions

Comments
9 min read
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

6
Comments 2
4 min read
Adversarial Thinking Template: Working Backward from the Goal

Adversarial Thinking Template: Working Backward from the Goal

6
Comments 1
2 min read
Why Your Parental Control API Will Fail: Architectural Lessons from TikTok, Roblox, and YouTube

Why Your Parental Control API Will Fail: Architectural Lessons from TikTok, Roblox, and YouTube

2
Comments 3
9 min read
Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

5
Comments 1
8 min read
Credential Optics Does Not Equal Institutional Access: Competence is Authored, Not Conferred

Credential Optics Does Not Equal Institutional Access: Competence is Authored, Not Conferred

Comments
2 min read
Beyond "The End of Cybersecurity": Refusal as Default Architecture

Beyond "The End of Cybersecurity": Refusal as Default Architecture

2
Comments 3
12 min read
I Don't Know If I'm An Expert (And That Might Be the Point)

I Don't Know If I'm An Expert (And That Might Be the Point)

34
Comments 11
5 min read
Beyond Mapping Adversarial Subspaces: Why AI Security Needs Architectural Defenses

Beyond Mapping Adversarial Subspaces: Why AI Security Needs Architectural Defenses

Comments
9 min read
Security for Bootstrapped Startups: The $0 Budget Checklist (2025)

Security for Bootstrapped Startups: The $0 Budget Checklist (2025)

1
Comments 2
10 min read
Defending AI Email Assistants Against Prompt Injection: A Forensic-First Framework

Defending AI Email Assistants Against Prompt Injection: A Forensic-First Framework

1
Comments
4 min read
Infrastructure Sovereignty and the AI-Proof Skill Stack: What the OpenAI-AWS Deal Reveals About Future-Proof Careers

Infrastructure Sovereignty and the AI-Proof Skill Stack: What the OpenAI-AWS Deal Reveals About Future-Proof Careers

Comments
7 min read
The Kitsune Protocol: Editorial Deployment of a Mythic Trickster for AI/ML Deception Logic

The Kitsune Protocol: Editorial Deployment of a Mythic Trickster for AI/ML Deception Logic

Comments
3 min read
Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Comments
3 min read
The Kali Protocol: Editorial Architecture for Refusal, Purge, and Motif Restoration

The Kali Protocol: Editorial Architecture for Refusal, Purge, and Motif Restoration

Comments
2 min read
Collapse Spectrum: Philethesia and Apatheia as Editorial Glyphs for AI/ML Systems

Collapse Spectrum: Philethesia and Apatheia as Editorial Glyphs for AI/ML Systems

Comments
2 min read
The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

Comments
3 min read
The Chim Lac Protocol: Editorial Architecture for Signal Compression and Motif Drift

The Chim Lac Protocol: Editorial Architecture for Signal Compression and Motif Drift

Comments
2 min read
The Sphinx Protocol: Encoding Ambiguity, Ascent, and Refusal in AI/ML Systems

The Sphinx Protocol: Encoding Ambiguity, Ascent, and Refusal in AI/ML Systems

Comments
3 min read
The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling

The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling

Comments
3 min read
The Janus Protocol: Strategic Duality and Leadership Dilemmas in Cybersecurity

The Janus Protocol: Strategic Duality and Leadership Dilemmas in Cybersecurity

Comments
3 min read
The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

Comments
7 min read
The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence

The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence

Comments
3 min read
The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology

The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology

2
Comments
8 min read
Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure

Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure

3
Comments
9 min read
I Built Quality Control Into an AI Tool's Architecture—Here's What It Generated

I Built Quality Control Into an AI Tool's Architecture—Here's What It Generated

10
Comments 1
11 min read
What 'Like You're Five' Security Actually Looks Like (Hint: It's Not Condescending)

What 'Like You're Five' Security Actually Looks Like (Hint: It's Not Condescending)

2
Comments
16 min read
Teaching OWASP Top 10 Through Visual Frameworks

Teaching OWASP Top 10 Through Visual Frameworks

Comments
16 min read
loading...