DEV Community

# privacy

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Security Theater vs Structural Protection

Security Theater vs Structural Protection

Comments
3 min read
I built a local-only PDF bank statement parser with a plugin system — here's how it works

I built a local-only PDF bank statement parser with a plugin system — here's how it works

2
Comments 1
2 min read
How OpenAI and Persona Built an Identity Surveillance Machine for the US Government

How OpenAI and Persona Built an Identity Surveillance Machine for the US Government

4
Comments 1
7 min read
Why I Built a Zero-Tracking React Native App in a Market Full of Data Miners

Why I Built a Zero-Tracking React Native App in a Market Full of Data Miners

1
Comments
3 min read
Your Browser Is Unique Among Millions: How Fingerprinting Works

Your Browser Is Unique Among Millions: How Fingerprinting Works

1
Comments
4 min read
Voice-to-Text for Developers: Why I Stopped Typing Half My Code Comments

Voice-to-Text for Developers: Why I Stopped Typing Half My Code Comments

1
Comments
5 min read
zkzkAgent – A Self-Hosted AI Assistant for Linux

zkzkAgent – A Self-Hosted AI Assistant for Linux

Comments
1 min read
We Replaced CAPTCHA with Cryptography. Here's How (and It's Free)

We Replaced CAPTCHA with Cryptography. Here's How (and It's Free)

1
Comments
5 min read
Stop Tracking, Start Protecting: Master Differential Privacy with PySyft for Group Health Analytics 🛡️🏃‍♂️

Stop Tracking, Start Protecting: Master Differential Privacy with PySyft for Group Health Analytics 🛡️🏃‍♂️

2
Comments 1
4 min read
Your Secrets Stay Local: Building a Privacy-First Mental Health AI with WebLLM and WebGPU

Your Secrets Stay Local: Building a Privacy-First Mental Health AI with WebLLM and WebGPU

1
Comments
4 min read
How I Built a PII Scrubber to Protect Against OpenClaw Breaches

How I Built a PII Scrubber to Protect Against OpenClaw Breaches

Comments
5 min read
Vector Database Breaches: How Embeddings Expose Your Sensitive Data

Vector Database Breaches: How Embeddings Expose Your Sensitive Data

1
Comments
5 min read
Model Theft: How Attackers Steal Your Fine-Tuned AI Models Through API Extraction

Model Theft: How Attackers Steal Your Fine-Tuned AI Models Through API Extraction

Comments
10 min read
Vector Database Leaks: Why Your AI Embeddings Are as Dangerous as Your Raw Data

Vector Database Leaks: Why Your AI Embeddings Are as Dangerous as Your Raw Data

Comments
10 min read
OpenClaw Security Incident Timeline: How One Platform Became the Largest Sovereign AI Breach

OpenClaw Security Incident Timeline: How One Platform Became the Largest Sovereign AI Breach

2
Comments
9 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.