Posts by peter
16
May
The “Zero-Trust” Lie
If you ever read O'Reilly's "Zero Trust Networks: Building Secure Systems in Untrusted Networks", you may have no...
10
May
Your browser’s sticky fingers
As the digital landscape evolves, so do the methods that companies use to collect user data. One of the most conc...
28
Apr
Detecting Fraud in AdTech
Malware developers are using app stores as dist...
27
Apr
Becoming your own Verizon
Grow-Your-Own Cellular Network...
26
Apr
Andy Warhol 2.0
I wanted to immortalize Andy Warhol as a Twitter bot @andaiwarhol powered by GPT-4 to continuous...
15
Apr
SIEM vs. SOAR vs. XDR
SIEM: Aggregates log data generated by applications, endpoints and network devices. Support for big data and real...
06
Apr
“Know your enemy.”
Chasing your tail with Raspberry Pi SDR
05
Apr
Fully Automatic GPT-4(7)
Autonomous AI has the potential to be a powerful tool that could be used to bring about the destruction of humani...
29
Mar
Prompt Engineering For Dummies
Now the latest overly shared cross-departmental tech marketing term since "endpoint security", prompt engineering...