Security Articles

Deep dives into cloud security, web server hardening, vulnerabilities, and encryption. Practical guides for developers who take security seriously.

Filters:

All Articles (10)

End-to-End Encryption: What It Actually Protects (and What It Doesn't)
encryption
intermediate

End-to-End Encryption: What It Actually Protects (and What It Doesn't)

E2E encryption means not even the service provider can read your messages — until you link WhatsApp Web and suddenly a browser has your keys. Here's how the Signal Protocol really works and where the trust boundaries are.

11 min readApr 4, 2026
encryptione2e
Zero-Knowledge Proofs: Proving You Know a Secret Without Revealing It
encryption
advanced

Zero-Knowledge Proofs: Proving You Know a Secret Without Revealing It

Zero-knowledge proofs sound like cryptographic magic — and they kind of are. Here's how they work, where they're already deployed in production systems, and why they matter beyond blockchain.

10 min readApr 1, 2026
zero-knowledgecryptography
Zero Trust Architecture: What It Actually Means Beyond the Buzzword
cloud security
advanced

Zero Trust Architecture: What It Actually Means Beyond the Buzzword

Every vendor sells "Zero Trust." Most of them are selling you a product, not an architecture. Here's what Zero Trust actually requires, where to start, and what you can do without a six-figure budget.

12 min readMar 15, 2026
zero-trustcloud-security
SQL Injection in 2026: Why the Oldest Attack Still Works
vulnerabilities
beginner

SQL Injection in 2026: Why the Oldest Attack Still Works

SQL injection is old enough to drink. It's also still in OWASP's top 10, still behind major breaches, and still in that one query your ORM didn't cover. Here's the modern defense.

9 min readMar 10, 2026
sql-injectionowasp
Securing GitHub Actions: Your Pipeline Is an Attack Surface
devsecops
intermediate

Securing GitHub Actions: Your Pipeline Is an Attack Surface

SolarWinds proved that compromising a build pipeline is game over. Your GitHub Actions workflows have write access to production — are you treating them like it?

11 min readMar 1, 2026
github-actionsci-cd
Let's Encrypt SSL Setup: Free HTTPS, But Read the Fine Print
encryption
beginner

Let's Encrypt SSL Setup: Free HTTPS, But Read the Fine Print

Setting up Let's Encrypt takes 10 minutes. Keeping it working takes understanding auto-renewal, Nginx config, and the gotchas that hit you at 2am when your cert silently expires.

8 min readFeb 25, 2026
sslhttps
Stop Leaking API Keys: I've Seen This Go Wrong Too Many Times
devsecops
beginner

Stop Leaking API Keys: I've Seen This Go Wrong Too Many Times

Somebody commits an AWS key to GitHub. Bots find it in seconds. A crypto miner spins up 200 instances. The bill arrives. I've watched this happen three times. Here's how to never be that person.

8 min readFeb 18, 2026
secretsapi-keys
TLS 1.3: What Actually Changed and Why You Should Care
encryption
intermediate

TLS 1.3: What Actually Changed and Why You Should Care

TLS 1.3 dropped the broken crypto, cut the handshake in half, and made forward secrecy mandatory. Here's a practical upgrade guide for Nginx — and the gotchas nobody mentions.

8 min readJan 25, 2026
tlsssl
AWS S3 Security: The Misconfiguration That Keeps Happening
cloud security
intermediate

AWS S3 Security: The Misconfiguration That Keeps Happening

I Googled a client's company name last month and found their S3 bucket indexed on page one. Here's how to make sure that never happens to you.

10 min readJan 20, 2026
awss3
Node.js Rate Limiting: What Happens When You Skip It
web servers
intermediate

Node.js Rate Limiting: What Happens When You Skip It

Your Express API is one curl loop away from a $4,000 cloud bill. Here's how rate limiting actually works in Node.js — and why the defaults will bite you.

9 min readJan 15, 2026
nodejsrate-limiting