DEV Community

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Quantifying the "Vague Anxiety" of Tailscale: tailsnitch Exposes 50 Configuration Mistakes

Quantifying the "Vague Anxiety" of Tailscale: tailsnitch Exposes 50 Configuration Mistakes

Comments
8 min read
JWT Is Stateless — But Real Apps Aren’t

JWT Is Stateless — But Real Apps Aren’t

Comments
2 min read
Level Up Your Linux Game: My Journey Through OverTheWire’s Bandit & Natas

Level Up Your Linux Game: My Journey Through OverTheWire’s Bandit & Natas

Comments 1
2 min read
THIS IS HOW REAL PASSWORD MANAGERS ACTUALLY WORK

THIS IS HOW REAL PASSWORD MANAGERS ACTUALLY WORK

Comments 1
2 min read
When the Industry Starts Describing the Symptoms of a Collapse You Already Mapped

When the Industry Starts Describing the Symptoms of a Collapse You Already Mapped

1
Comments
3 min read
When "Internal" Stops Meaning Safe

When "Internal" Stops Meaning Safe

Comments
8 min read
Why CSA STAR Can't Govern AI Agents (And What Comes Next)

Why CSA STAR Can't Govern AI Agents (And What Comes Next)

2
Comments
2 min read
Coordination Is the Substrate: What NVIDIA's Groq Acquisition Really Signals About AI Governance

Coordination Is the Substrate: What NVIDIA's Groq Acquisition Really Signals About AI Governance

1
Comments
3 min read
Flutter Security: Why `isMockLocation` Is Dead in 2026 (And How to Fix It)

Flutter Security: Why `isMockLocation` Is Dead in 2026 (And How to Fix It)

1
Comments
3 min read
I built a chat app that stores absolutely nothing about you. No phone. No email. No logs.

I built a chat app that stores absolutely nothing about you. No phone. No email. No logs.

Comments
1 min read
Cache-Control for Private APIs — the bug nobody sees

Cache-Control for Private APIs — the bug nobody sees

Comments
1 min read
Gatekeeper, Silence, and a File Manager That Just Needed Permission

Gatekeeper, Silence, and a File Manager That Just Needed Permission

Comments
3 min read
Designing an Authentication System: OAuth and SSO

Designing an Authentication System: OAuth and SSO

Comments
8 min read
Building Trust in AI Agents: Why Identity Verification is the Missing Layer

Building Trust in AI Agents: Why Identity Verification is the Missing Layer

Comments
2 min read
CVE-2023-43633: Trusted Boot, Untrusted Config: Breaking EVE OS Encryption (CVE-2023-43633)

CVE-2023-43633: Trusted Boot, Untrusted Config: Breaking EVE OS Encryption (CVE-2023-43633)

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.