DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

Autenticación y verificación de identidad (Captura, contenedor, firma y primer flujo de personalización)

1
Comments
4 min read
Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)

Module 1 — Identity Authentication and Verification (Capture, Container, Signature, and Initial Personalization Flow)

1
Comments
4 min read
Decoy-Hunter: Technical Enhancement for Verifiable Evidence and Stateful Protocol Probes.

Decoy-Hunter: Technical Enhancement for Verifiable Evidence and Stateful Protocol Probes.

1
Comments
6 min read
Federated Learning's 'Zero Trust' Revolution: Secure AI for a Suspicious World

Federated Learning's 'Zero Trust' Revolution: Secure AI for a Suspicious World

Comments
2 min read
Stop Overthinking Authentication: A 3-Question Guide to Choosing JWT vs. Sessions

Stop Overthinking Authentication: A 3-Question Guide to Choosing JWT vs. Sessions

1
Comments
2 min read
GenesisDB - The GDPR-ready event-sourcing database engine

GenesisDB - The GDPR-ready event-sourcing database engine

1
Comments
1 min read
GitHub Security Notifications for Discord

GitHub Security Notifications for Discord

Comments
4 min read
Ghost Nodes: Red Teaming Social Graphs for Maximum Privacy

Ghost Nodes: Red Teaming Social Graphs for Maximum Privacy

Comments
2 min read
Privacy-Preserving AI: 7 Techniques to Protect Training Data in Cloud AI Systems

Privacy-Preserving AI: 7 Techniques to Protect Training Data in Cloud AI Systems

Comments
8 min read
Masking Sensitive Data in CloudWatch Logs for APIs (and keeping your secrets safe!)

Masking Sensitive Data in CloudWatch Logs for APIs (and keeping your secrets safe!)

1
Comments
4 min read
Cloak and Swagger: Hiding in Plain Sight on Social Networks

Cloak and Swagger: Hiding in Plain Sight on Social Networks

1
Comments
2 min read
System Design Basics: Scalability vs Performance vs Security

System Design Basics: Scalability vs Performance vs Security

Comments
3 min read
The Digital Ghost: Cloaking Influence in Social Networks

The Digital Ghost: Cloaking Influence in Social Networks

Comments
2 min read
## 🧅 Inside Tor: A Simplified Look at Its Architecture and Code Organization

## 🧅 Inside Tor: A Simplified Look at Its Architecture and Code Organization

Comments
3 min read
Exploring Claude's Quirks: Bugs, Laughs, and Transparency | Anthropic AI

Exploring Claude's Quirks: Bugs, Laughs, and Transparency | Anthropic AI

6
Comments
3 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.