DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Privacy-Preserving AI: 7 Techniques to Protect Training Data in Cloud AI Systems

Privacy-Preserving AI: 7 Techniques to Protect Training Data in Cloud AI Systems

Comments
8 min read
Cloak and Swagger: Hiding in Plain Sight on Social Networks

Cloak and Swagger: Hiding in Plain Sight on Social Networks

1
Comments
2 min read
The Digital Ghost: Cloaking Influence in Social Networks

The Digital Ghost: Cloaking Influence in Social Networks

4
Comments
2 min read
Puzzles for Hacker (task only)

Puzzles for Hacker (task only)

1
Comments
6 min read
## 🧅 Inside Tor: A Simplified Look at Its Architecture and Code Organization

## 🧅 Inside Tor: A Simplified Look at Its Architecture and Code Organization

Comments
3 min read
Building a CLI for the Ecosyste.ms API

Building a CLI for the Ecosyste.ms API

2
Comments
3 min read
Fort Knox Federated Learning: Next-Gen Security Tactics

Fort Knox Federated Learning: Next-Gen Security Tactics

Comments
2 min read
Biometric fingerprint authentication on SmartCard Chips

Biometric fingerprint authentication on SmartCard Chips

Comments
3 min read
Hosting Private AI with Railway - Tech Breakdown

Hosting Private AI with Railway - Tech Breakdown

2
Comments
3 min read
Security Risks and Improvement Strategies for Multi-Channel OTP Fallback

Security Risks and Improvement Strategies for Multi-Channel OTP Fallback

2
Comments
3 min read
🍎 From UTXOs to SegWit: How Bitcoin Fixed Transaction Malleability and Lowered Fees

🍎 From UTXOs to SegWit: How Bitcoin Fixed Transaction Malleability and Lowered Fees

3
Comments
2 min read
Privileged: A Powerful Authorization Library for .NET

Privileged: A Powerful Authorization Library for .NET

Comments
4 min read
🚀 Secure Your Flutter Apps Like a Pro! 🔐

🚀 Secure Your Flutter Apps Like a Pro! 🔐

1
Comments
1 min read
API Security in Django: Approaches, Trade-offs, and Best Practices

API Security in Django: Approaches, Trade-offs, and Best Practices

3
Comments
6 min read
Why eFuses Matter in Firmware Security: Permanent Storage, Anti-Rollback, and Device Identity

Why eFuses Matter in Firmware Security: Permanent Storage, Anti-Rollback, and Device Identity

2
Comments
4 min read
The Pointer-Based Security Paradigm: Architectural Shift from Data Protection to Data Non-Existence

The Pointer-Based Security Paradigm: Architectural Shift from Data Protection to Data Non-Existence

12
Comments 4
4 min read
Fantastic AWS Policies and Where to Find Them

Fantastic AWS Policies and Where to Find Them

2
Comments 1
9 min read
SSL: Your Website's Digital Seatbelt 🔒

SSL: Your Website's Digital Seatbelt 🔒

Comments
5 min read
Python Logging Best Practices - Obvious and Not-So-Obvious

Python Logging Best Practices - Obvious and Not-So-Obvious

3
Comments
10 min read
Lock Down Your Data: Implement Row-Level Security Policies in Supabase SQL

Lock Down Your Data: Implement Row-Level Security Policies in Supabase SQL

8
Comments
13 min read
Security news weekly round-up - 22nd August 2025

Security news weekly round-up - 22nd August 2025

Comments
3 min read
🔐Security-Proofing My Full Stack App Against XSS Attacks (Cross-Site Scripting)

🔐Security-Proofing My Full Stack App Against XSS Attacks (Cross-Site Scripting)

6
Comments 2
2 min read
5 Fatal Mistakes: Why Your AI Agent Keeps Failing in Production

5 Fatal Mistakes: Why Your AI Agent Keeps Failing in Production

1
Comments
4 min read
Passwords, Resilience, And Being Human: Working Together For A Brighter Future At BSides Las Vegas 2025

Passwords, Resilience, And Being Human: Working Together For A Brighter Future At BSides Las Vegas 2025

Comments
10 min read
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions

Cybersecurity: Scan your hosts, before vulnerabilities cost you millions

Comments
3 min read
loading...