When Mastery Gets Flagged: AI Detectors, False Positives, and the Inversion of Trust Post date November 26, 2025 Post author By Narnaiezzsshaa Truong Post categories In aiethics, cybersecuritymindset, humanvsmachine, writingcraft
When Mastery Gets Flagged: AI Detectors, False Positives, and the Inversion of Trust Post date November 26, 2025 Post author By Narnaiezzsshaa Truong Post categories In aiethics, cybersecuritymindset, humanvsmachine, writingcraft
What Fraud Taught Me About Teaching Children Digital Trust: A Retrospective Post date November 25, 2025 Post author By Narnaiezzsshaa Truong Post categories In cybersecurity, mindfulness, parenting, phishing
The Threat Intelligence Ouroboros: Why the Ancient Symbol Fits Modern Security Post date November 21, 2025 Post author By Narnaiezzsshaa Truong Post categories In devops, infosec, security, threathunting
Credential Optics Institutional Access: Competence is Authored, Not Conferred Post date November 15, 2025 Post author By Narnaiezzsshaa Truong Post categories In career, cybersecurity, discuss, security
Beyond “The End of Cybersecurity”: Refusal as Default Architecture Post date November 14, 2025 Post author By Narnaiezzsshaa Truong Post categories In ai, architecture, cybersecurity, security
Beyond “The End of Cybersecurity”: Refusal as Default Architecture Post date November 14, 2025 Post author By Narnaiezzsshaa Truong Post categories In ai, architecture, cybersecurity, security
Beyond Mapping Adversarial Subspaces: Why AI Security Needs Architectural Defenses Post date November 12, 2025 Post author By Narnaiezzsshaa Truong Post categories In adversarialml, ai, cybersecurity, machinelearning
The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense Post date October 30, 2025 Post author By Narnaiezzsshaa Truong Post categories In ai, cybersecurity, machinelearning, threatmodeling
The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling Post date October 29, 2025 Post author By Narnaiezzsshaa Truong Post categories In ai, cybersecurity, surveillance, threatmodeling
The Baba Yaga Protocol – Adaptive Gatekeeping and Pre-Authentication Intelligence Post date October 28, 2025 Post author By Narnaiezzsshaa Truong Post categories In authentication, cybersecurity, mythology, zerotrust
Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure Post date October 27, 2025 Post author By Narnaiezzsshaa Truong Post categories In cybersecurity, owasp, securityeducation, threatmodeling
What ‘Like You’re Five’ Security Actually Looks Like (Hint: It’s Not Condescending) Post date October 26, 2025 Post author By Narnaiezzsshaa Truong Post categories In ai, cybersecurity, showdev, tutorial