Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
privacy
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Email OSINT: How to Investigate Any Email Address
Kyle Brennan
Kyle Brennan
Kyle Brennan
Follow
Feb 11
Email OSINT: How to Investigate Any Email Address
#
security
#
osint
#
privacy
#
tutorial
Comments
Add Comment
3 min read
Privacy-First Pain Tracking as a New Digital Health Standard
CrisisCore-Systems
CrisisCore-Systems
CrisisCore-Systems
Follow
Feb 13
Privacy-First Pain Tracking as a New Digital Health Standard
#
healthtech
#
privacy
#
opensource
#
pwa
Comments
Add Comment
10 min read
The Invisible Data Economy: How Personal Data Moves Across the Internet
Brian Williams
Brian Williams
Brian Williams
Follow
Feb 12
The Invisible Data Economy: How Personal Data Moves Across the Internet
#
data
#
privacy
#
softwaredevelopment
#
web
Comments
Add Comment
5 min read
How VPNs Became a Consumer App Category, Not Just a Network Tool
Brian Williams
Brian Williams
Brian Williams
Follow
Feb 12
How VPNs Became a Consumer App Category, Not Just a Network Tool
#
marketing
#
networking
#
privacy
#
product
Comments
Add Comment
4 min read
Loi 25 du Québec : Toolkit Open-Source pour la Conformité en 5 Minutes
Rayel
Rayel
Rayel
Follow
Feb 11
Loi 25 du Québec : Toolkit Open-Source pour la Conformité en 5 Minutes
#
webdev
#
opensource
#
javascript
#
privacy
Comments
Add Comment
2 min read
Integrating PII-Shield into GuardSpine (WASM vs Native execution)
Ilya Ploskovitov
Ilya Ploskovitov
Ilya Ploskovitov
Follow
Feb 25
Integrating PII-Shield into GuardSpine (WASM vs Native execution)
#
architecture
#
go
#
privacy
#
security
Comments
Add Comment
6 min read
From Messy Med-Reports to Smart Insights: Building a FHIR-Powered Medical RAG with Milvus
Beck_Moulton
Beck_Moulton
Beck_Moulton
Follow
Feb 16
From Messy Med-Reports to Smart Insights: Building a FHIR-Powered Medical RAG with Milvus
#
ai
#
privacy
#
webdev
#
tutorial
Comments
Add Comment
3 min read
Exports are a security boundary: the moment local-first becomes shareable
CrisisCore-Systems
CrisisCore-Systems
CrisisCore-Systems
Follow
Feb 12
Exports are a security boundary: the moment local-first becomes shareable
#
architecture
#
privacy
#
security
#
webdev
Comments
Add Comment
3 min read
Pseudonymization vs. Anonymization: Which One Actually Protects Your Data?
Manuel Weiss
Manuel Weiss
Manuel Weiss
Follow
Feb 20
Pseudonymization vs. Anonymization: Which One Actually Protects Your Data?
#
data
#
privacy
#
security
#
testing
6
 reactions
Comments
Add Comment
9 min read
OPSEC for OSINT: How to Investigate Without Getting Burned
Kyle Brennan
Kyle Brennan
Kyle Brennan
Follow
Feb 11
OPSEC for OSINT: How to Investigate Without Getting Burned
#
security
#
privacy
#
cybersecurity
#
tutorial
Comments
Add Comment
3 min read
AI Ethics for Developers: 5 Essential Guidelines When Building AI Applications
Paul Robertson
Paul Robertson
Paul Robertson
Follow
Feb 12
AI Ethics for Developers: 5 Essential Guidelines When Building AI Applications
#
ai
#
privacy
#
security
#
softwaredevelopment
Comments
1
 comment
4 min read
I Built 25 Free Developer Tools That Run Entirely in Your Browser
Kiel Malpass
Kiel Malpass
Kiel Malpass
Follow
Feb 10
I Built 25 Free Developer Tools That Run Entirely in Your Browser
#
webdev
#
javascript
#
privacy
#
tools
Comments
Add Comment
4 min read
The Privacy Puzzle in Decentralized AI
Girish 11
Girish 11
Girish 11
Follow
Feb 10
The Privacy Puzzle in Decentralized AI
#
privacy
#
ai
#
blockchain
#
airesearch
Comments
Add Comment
2 min read
A Discordant View: 3 Alternatives to Discord and how we got here...
greybeardluddite
greybeardluddite
greybeardluddite
Follow
Feb 24
A Discordant View: 3 Alternatives to Discord and how we got here...
#
discord
#
security
#
privacy
#
palantir
1
 reaction
Comments
Add Comment
9 min read
Some Thoughts on Privacy and Everyday Technology
Charles Lueilwitz
Charles Lueilwitz
Charles Lueilwitz
Follow
Feb 9
Some Thoughts on Privacy and Everyday Technology
#
design
#
privacy
#
security
#
ux
Comments
Add Comment
2 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account