Upcoming Hardening in PHP

YouTube video embedding harm reduction

On non-technical video-games cheat mitigations

Horrible edge cases to consider when dealing with music (2022)

Book Review: Applied Math for Security

The quest for a family-friendly password manager

Big Bird: killing SQL injection with graph homomorphisms

Horrible edge cases to consider when dealing with music

Glitch effect on text in pure CSS

Ten years of MAT

Malwarebytes' privacy VPN is Mullvad in a shady trenchcoat

The web browser I'm dreaming of

My Favourite C++ Footgun

Spectre Exploits in the “Wild”

Paper review: Statistical and Combinatorial Analysis of the TOR Routing Protocol

PHP8, from a security point of view

Security features of musl

On the pervasive presence of military language elements in computer security

I wont buy ebooks anymore

WireGuard and forward secrecy for clients

Snuffleupagus versus recent high-profile vulnerabilities

Firefox own linker on Android

How to radare2 a fake openssh exploit

Firefox, you're supposed to be in my pocket, not the other way around

On superfish and cloudflare

Reverse engineering a compromised TOR browser bundle

Reverse engineering a fake Tor browser bundle