DEV Community

Security

Hopefully not just an afterthought!

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
License Protection vs. Code Obfuscation: What .NET Developers Actually Need

License Protection vs. Code Obfuscation: What .NET Developers Actually Need

Comments
3 min read
We Replaced CAPTCHA With an Invisible Trust Engine (Beta Open)

We Replaced CAPTCHA With an Invisible Trust Engine (Beta Open)

Comments
2 min read
Building a Fast File Transfer Tool, Part 2: Beating rsync by 58% with kTLS

Building a Fast File Transfer Tool, Part 2: Beating rsync by 58% with kTLS

1
Comments
4 min read
New Security Teammate:AWS Security Agent

New Security Teammate:AWS Security Agent

1
Comments
6 min read
Passkeys in Production: Adding WebAuthn to a SaaS

Passkeys in Production: Adding WebAuthn to a SaaS

Comments
4 min read
Cybersecurity ProxyChains: A Mask of Anonymity

Cybersecurity ProxyChains: A Mask of Anonymity

1
Comments
3 min read
AI Chat Privacy Breach Explained How a Trusted Chrome Extension Exposed Millions of Conversations

AI Chat Privacy Breach Explained How a Trusted Chrome Extension Exposed Millions of Conversations

Comments
5 min read
Designing Bitcoin Infrastructure Under Adversarial Assumptions

Designing Bitcoin Infrastructure Under Adversarial Assumptions

Comments
4 min read
Async Assumptions That Create Security Blind Spots in Web3 Backends.

Async Assumptions That Create Security Blind Spots in Web3 Backends.

5
Comments
4 min read
Docker Sandboxes: A Deep Dive into Secure AI Agent Isolation

Docker Sandboxes: A Deep Dive into Secure AI Agent Isolation

1
Comments
12 min read
Code Utopia in 2026: The Four Pillars of Production-Ready Code

Code Utopia in 2026: The Four Pillars of Production-Ready Code

Comments 1
3 min read
Praktikum Keamanan Web: Cross-Site Request Forgery (CSRF) 😱🛡️

Praktikum Keamanan Web: Cross-Site Request Forgery (CSRF) 😱🛡️

Comments
3 min read
The "Virtual Air Gap": Building Fort Knox in AWS

The "Virtual Air Gap": Building Fort Knox in AWS

1
Comments
4 min read
QARX-256

QARX-256

Comments
1 min read
Stealth Inline Hook Detection via LR Return Address

Stealth Inline Hook Detection via LR Return Address

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.