Articles tagged "Security"

Articles tagged with "Security"

5 min read

Stop Manually Tracking Development Ports: I Built an Automated Solution

Tired of manually tracking ports across development projects? I was maintaining a text file like a caveman until LLM agents forced me to automate. Here's devports, the npm package that eliminates port conflicts across git worktrees and lets AI agents manage multi-service development environments without manual intervention.

TechnologySecurity
7 min read

Understanding OAuth 2.0 Refresh Tokens

A comprehensive guide to OAuth 2.0 refresh tokens using a theme park analogy. Learn how refresh tokens balance security with user experience, and understand token rotation for detecting compromised credentials.

TechnologySecurity
20 min read

Social Engineering an LLM

LLMs are getting better, they say. And I agree. I'm finding them to be more helpful with coding now than a few years ago. They retain context a little better, drift less, and tend to hallucinate less. But what happens when someone with malicious intent uses the same techniques that make LLMs helpful to manipulate them into crossing ethical boundaries?

AISecurity
3 min read

You share your life on Facebook...

Somewhat related to the “if you’ve got nothing to hide, you’ve got nothing to fear” argument.

Data RetentionData SovereigntyOpinionPoliticsPrivacySecuritySurveillance
5 min read

Why I Moved from Signal to WhatsApp

It's probably one of the major contributors to making secure, encrypted, safe communication accessible to all. I recommend it to anyone, if you're not already encrypting your communications.

FreedomOpen SourceOpinionPrivacySecurity
4 min read

How Apple can Ethically unlock the iPhone for the FBI

### Preamble

TechnologyPrivacySecurity
CitizenFour
4 min read

CitizenFour

I wasn't sure what to expect; I'd been keeping up to date with the information Edward Snowden had released to Laura Poitras and Glenn Greenwald already, as has most of the world. Similarly, I had read...

Civil LibertiesEdward SnowdenOpinionPrivacySecurity
9 min read

Is Fingerprint Authentication Breeding Insecurity?

So, should you be concerned about the security implications of giving your fingerprint to your phone?

Data SovereigntyPrivacySecurityTechnology
11 min read

The Nothing to Hide argument

"If you aren't doing anything illegal why would you care if someone captures your license plate number?" "If I'm not doing anything illegal, why do the police need to record my license plate number?" ...

TechnologyPrivacySecurity
12 min read

Privacy and Security in a Mobile Phone World

This question, though, was met with silence, a pause, a smile and a one line response: "I'll have to write a whole blog post about that topic!"

TechnologyPrivacySecurity
3 min read

Making the Switch from Google

My problem now is they know too much. Yes, they already know a lot, but so far they only know what I make public. Now they want to know my secrets. They've indexed every web page my name appears on al...

Data OwnershipLegalOpen SourcePrivacyPrivacySecurity
4 min read

Will Cloud Computing Violate your Privacy and Security?

That's what I understood from the show. I'm not entirely sure how Chrome fits in to the equation, but I'll get to that later.

TechnologyPrivacySecurity