DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Deploying Keycloak on GKE with a custom Helm Chart

Deploying Keycloak on GKE with a custom Helm Chart

Comments
5 min read
🔐 Matching in the Dark: Zero‑Knowledge Filtering Using 32‑Bit Bitmasks

🔐 Matching in the Dark: Zero‑Knowledge Filtering Using 32‑Bit Bitmasks

1
Comments
5 min read
OpenClaw on Your Own Hardware: A Security-First Setup Guide

OpenClaw on Your Own Hardware: A Security-First Setup Guide

3
Comments
7 min read
The 3-Layer Trick That Completely Killed My Spam Problem

The 3-Layer Trick That Completely Killed My Spam Problem

Comments
3 min read
Webhook Security Best Practices for 2026: HMAC Verification, Replay Prevention & Safe Debugging

Webhook Security Best Practices for 2026: HMAC Verification, Replay Prevention & Safe Debugging

Comments
4 min read
Stress Test My Digital Fortress: An eBPF + Shannon Entropy Guard (Open Sourced)

Stress Test My Digital Fortress: An eBPF + Shannon Entropy Guard (Open Sourced)

Comments
2 min read
Your Obfuscation is Just Math to Me: An eBPF Guillotine in the Linux Kernel

Your Obfuscation is Just Math to Me: An eBPF Guillotine in the Linux Kernel

Comments
2 min read
Linux File Integrity Monitoring That Actually Works: AIDE + systemd Timer + Safe Baseline Updates

Linux File Integrity Monitoring That Actually Works: AIDE + systemd Timer + Safe Baseline Updates

Comments
4 min read
I Built a Chat Server That Cannot Read Your Messages — Here's How

I Built a Chat Server That Cannot Read Your Messages — Here's How

1
Comments
5 min read
How to Geo-Block Countries in Express.js (Free IP Geolocation API)

How to Geo-Block Countries in Express.js (Free IP Geolocation API)

Comments
4 min read
3 OpenClaw Skills I Built in One Day (Memory, Security, and Automation)

3 OpenClaw Skills I Built in One Day (Memory, Security, and Automation)

1
Comments
4 min read
AI Is Making Security More Agile: Highlights from ChiBrrCon 2026

AI Is Making Security More Agile: Highlights from ChiBrrCon 2026

2
Comments
8 min read
What Is Confidential AI? The Security Gap Your Encryption Doesn’t Cover

What Is Confidential AI? The Security Gap Your Encryption Doesn’t Cover

2
Comments
12 min read
How to Verify Email Addresses in JavaScript (Without Sending Emails)

How to Verify Email Addresses in JavaScript (Without Sending Emails)

Comments
6 min read
Five Events This Week Proved the Same Thing: AI Provenance Without Refusal Logs Is Half an Architecture

Five Events This Week Proved the Same Thing: AI Provenance Without Refusal Logs Is Half an Architecture

Comments
23 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.