DEV Community

Narnaiezzsshaa Truong profile picture

Narnaiezzsshaa Truong

Security tools for bootstrapped startups

Location Texas, United States Joined Joined on  Personal website https://www.linkedin.com/in/narnaiezzsshaa-truong
8 Week Community Wellness Streak
Xano AI-Powered Backend Challenge Completion
DEV Challenge Volunteer Judge
2
4 Week Community Wellness Streak
2 Week Community Wellness Streak
Writing Debut
1 Week Community Wellness Streak
Top 7
The Human Fear of Erasure (and Why It Shows Up in Your Systems)

The Human Fear of Erasure (and Why It Shows Up in Your Systems)

2
Comments
4 min read

Want to connect with Narnaiezzsshaa Truong?

Create an account to connect with Narnaiezzsshaa Truong. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
OSI Layer 9—The Council: Governance, Power, and the Politics of Security

OSI Layer 9—The Council: Governance, Power, and the Politics of Security

1
Comments
4 min read
AI Music Isn't a Creative Problem—It's a Governance Failure Mode

AI Music Isn't a Creative Problem—It's a Governance Failure Mode

Comments
4 min read
Operational Indistinguishability: A Technical Guide to the Doppelgänger Framework

Operational Indistinguishability: A Technical Guide to the Doppelgänger Framework

Comments
4 min read
The Epistemology of Offense and Defense: A Foundational Framework

The Epistemology of Offense and Defense: A Foundational Framework

Comments
6 min read
Local-First Is Actually a Governance Revolution

Local-First Is Actually a Governance Revolution

Comments
4 min read
RouterEval: An Evaluation Harness for LLM Routing Policies

RouterEval: An Evaluation Harness for LLM Routing Policies

Comments
6 min read
The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

1
Comments
2 min read
If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML

If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML

1
Comments
3 min read
Stop Trying to "Push Through It": A Developer's Guide to Internal Governance

Stop Trying to "Push Through It": A Developer's Guide to Internal Governance

3
Comments 1
3 min read
Build a Self-Evolving Memory Agent in 150 Lines

Build a Self-Evolving Memory Agent in 150 Lines

Comments
4 min read
EIOC Guard™ Runbook: SOC‑Style Emotional Incident Response

EIOC Guard™ Runbook: SOC‑Style Emotional Incident Response

1
Comments
3 min read
How To Detect Memory Drift In Production Agents

How To Detect Memory Drift In Production Agents

1
Comments
3 min read
Why Memory Architecture Matters More Than Your Model

Why Memory Architecture Matters More Than Your Model

1
Comments
2 min read
OSI Layer 8—The Sovereign: Emotional Architecture, Organizational Mythology, and the Security of Human Intention

OSI Layer 8—The Sovereign: Emotional Architecture, Organizational Mythology, and the Security of Human Intention

1
Comments
4 min read
Second-Half Routing: From Traffic Control to Collective Intelligence

Second-Half Routing: From Traffic Control to Collective Intelligence

Comments
5 min read
How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines

How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines

Comments
1 min read
Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI

Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI

Comments
6 min read
The Creator's Paradox in the AI Era: How to Stay Generative When Everything Gets Scraped

The Creator's Paradox in the AI Era: How to Stay Generative When Everything Gets Scraped

Comments
2 min read
EIOC: A Detection Framework for Human‑Layer Security

EIOC: A Detection Framework for Human‑Layer Security

Comments
3 min read
The Democratization Fallacy: How 'AI for Everyone' Became a Modern Myth

The Democratization Fallacy: How 'AI for Everyone' Became a Modern Myth

Comments
3 min read
OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic

OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic

Comments
4 min read
The Labors of Heracles as Risk Management for SMBs

The Labors of Heracles as Risk Management for SMBs

Comments
3 min read
Kill Chain Analysis for a Toxic Meeting

Kill Chain Analysis for a Toxic Meeting

Comments
3 min read
Tech Horror Codex: Technical Debt

Tech Horror Codex: Technical Debt

Comments
2 min read
OSI Layer 6—Presentation Layer Security

OSI Layer 6—Presentation Layer Security

Comments
4 min read
Tech Horror Codex: Vendor Lock‑In

Tech Horror Codex: Vendor Lock‑In

Comments
2 min read
EIOC as a Detection Model: From Framework to Code

EIOC as a Detection Model: From Framework to Code

Comments
5 min read
Tech Horror Codex: Data Gravity

Tech Horror Codex: Data Gravity

Comments
2 min read
Tech Horror Codex: Substrate Sovereignty

Tech Horror Codex: Substrate Sovereignty

Comments
2 min read
Computers Are Dumb. That’s Why AI Feels So Dangerous—and So Useful.

Computers Are Dumb. That’s Why AI Feels So Dangerous—and So Useful.

Comments
3 min read
OSI Layer 5—Session Layer Security

OSI Layer 5—Session Layer Security

Comments
4 min read
OSI Layer 4—The Steward

OSI Layer 4—The Steward

Comments
4 min read
Model‑First Reasoning Myth‑Tech: One Mechanism, Two Dialects

Model‑First Reasoning Myth‑Tech: One Mechanism, Two Dialects

Comments
2 min read
EIOC in Human-AI Interaction: A Framework for Trust, Agency, and Collaborative Intelligence

EIOC in Human-AI Interaction: A Framework for Trust, Agency, and Collaborative Intelligence

5
Comments
3 min read
When Inefficiency Has a Price Tag: Why "Good Habits" Aren't Optional in SMB/S Software Development

When Inefficiency Has a Price Tag: Why "Good Habits" Aren't Optional in SMB/S Software Development

2
Comments
3 min read
When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means

When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means

Comments
4 min read
EIOC for Engineers, PMs, and AI Safety Practitioners

EIOC for Engineers, PMs, and AI Safety Practitioners

Comments
3 min read
Anansi’s Web as Neural Architecture: From Folklore to Framework

Anansi’s Web as Neural Architecture: From Folklore to Framework

Comments
2 min read
Hero's Journey Security Assessment API—Mythological Framework Meets SMB Cybersecurity

Xano AI-Powered Backend Challenge: Public API Submission

Hero's Journey Security Assessment API—Mythological Framework Meets SMB Cybersecurity

4
Comments
5 min read
A Company Spam-Commented on My Article About Performative Expertise—And Proved My Point

A Company Spam-Commented on My Article About Performative Expertise—And Proved My Point

Comments
5 min read
Emotional Indicators of Compromise: A New Frontier in Security Awareness

Emotional Indicators of Compromise: A New Frontier in Security Awareness

Comments 1
3 min read
Dual-Use Mythological Frameworks: How Narada Encodes Both Attack and Defense in AI/ML Security

Dual-Use Mythological Frameworks: How Narada Encodes Both Attack and Defense in AI/ML Security

Comments
5 min read
The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift

The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift

Comments
2 min read
The Ravana Protocol: Encoding Multi-Agent Orchestration and Model Stacking in AI/ML Systems

The Ravana Protocol: Encoding Multi-Agent Orchestration and Model Stacking in AI/ML Systems

Comments 1
3 min read
The Equalizer and the Integrator: AI, Cybersecurity, and the Human Insight Imperative

The Equalizer and the Integrator: AI, Cybersecurity, and the Human Insight Imperative

4
Comments
5 min read
The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

3
Comments 2
4 min read
When Mastery Gets Flagged: AI Detectors, False Positives, and the Inversion of Trust

When Mastery Gets Flagged: AI Detectors, False Positives, and the Inversion of Trust

5
Comments 4
2 min read
Beyond Filters: Rearchitecting Prompt Injection Defense

Beyond Filters: Rearchitecting Prompt Injection Defense

Comments
5 min read
When Noise Becomes Motif: Defending Originality in the Age of Opportunistic Attention

When Noise Becomes Motif: Defending Originality in the Age of Opportunistic Attention

Comments
6 min read
OSI Layer 4 Security Vulnerabilities & Resolutions

OSI Layer 4 Security Vulnerabilities & Resolutions

Comments
9 min read
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security

6
Comments 2
4 min read
Adversarial Thinking Template: Working Backward from the Goal

Adversarial Thinking Template: Working Backward from the Goal

6
Comments 1
2 min read
Why Your Parental Control API Will Fail: Architectural Lessons from TikTok, Roblox, and YouTube

Why Your Parental Control API Will Fail: Architectural Lessons from TikTok, Roblox, and YouTube

2
Comments 3
9 min read
Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

Forensic Framework: Cybersecurity Lies Developers Hear About SMB Security

5
Comments 1
8 min read
Credential Optics Does Not Equal Institutional Access: Competence is Authored, Not Conferred

Credential Optics Does Not Equal Institutional Access: Competence is Authored, Not Conferred

Comments
2 min read
Beyond "The End of Cybersecurity": Refusal as Default Architecture

Beyond "The End of Cybersecurity": Refusal as Default Architecture

2
Comments 3
12 min read
I Don't Know If I'm An Expert (And That Might Be the Point)

I Don't Know If I'm An Expert (And That Might Be the Point)

34
Comments 11
5 min read
Beyond Mapping Adversarial Subspaces: Why AI Security Needs Architectural Defenses

Beyond Mapping Adversarial Subspaces: Why AI Security Needs Architectural Defenses

Comments
9 min read
Security for Bootstrapped Startups: The $0 Budget Checklist (2025)

Security for Bootstrapped Startups: The $0 Budget Checklist (2025)

1
Comments 2
10 min read
loading...