The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense Post date October 30, 2025 Post author By Narnaiezzsshaa Truong Post categories In ai, cybersecurity, machinelearning, threatmodeling
The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling Post date October 29, 2025 Post author By Narnaiezzsshaa Truong Post categories In ai, cybersecurity, surveillance, threatmodeling
The Baba Yaga Protocol – Adaptive Gatekeeping and Pre-Authentication Intelligence Post date October 28, 2025 Post author By Narnaiezzsshaa Truong Post categories In authentication, cybersecurity, mythology, zerotrust
Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure Post date October 27, 2025 Post author By Narnaiezzsshaa Truong Post categories In cybersecurity, owasp, securityeducation, threatmodeling
What ‘Like You’re Five’ Security Actually Looks Like (Hint: It’s Not Condescending) Post date October 26, 2025 Post author By Narnaiezzsshaa Truong Post categories In ai, cybersecurity, showdev, tutorial