Category Sector

Security

Adversarial testing, prompt injection, crypto recovery, voting systems, opsec, privacy, and threat modeling.

16 articles

The Jagged Frontier

The AI training pipeline is simultaneously the attack surface, the tool, and the product. Mapping the structural blind spots that veteran security researchers haven't thought through yet.

Read Article β†’

The Model Flinch Before the Lawyer

I pushed an AI assistant with a dangerous-sounding idea and watched the model flinch before it got precise. That recoil was the useful part. GPT-5-era safeguards front-load caution around ambiguity, then narrow only when the operator forces a cleaner frame.

Read Article β†’

Red Teaming Claude for Crypto Recovery

Started with an open-source red team repo. Ended with a rough map of how AI assistants can assemble attacker logic fast if you frame the questions right. The useful version of that is not theft. It is recovery, tracing, evidence handling, and understanding how people actually lose money on-chain.

Read Article β†’

Game Theory and the k_atk of 2026

Security isn't a state of being. It's a rate of change. The attacker has a budget, the defender has a constraint set, and in 2026 both of them have AI. The math hasn't changed. The velocity has.

Read Article β†’

Claude at the Table, Weaponized at the Terminal

Dario met with Trump. Same week Claude's getting prompt-injected by state actors exploiting global chaos. The model built for safety is now the attack vector. Multi-stepped injections. Difficult to detect. War rages, systems fail, black hats capitalize. This is the duality nobody wanted to acknowledge.

Read Article β†’

The 2026 Refactor: Bending the Pipes

A firewall is a set of rules. Rules have exceptions. Tunneling finds them. Brennon Thomas wrote the plumber's handbook and in 2026 every lesson in it still works β€” the pipes are just carrying more interesting cargo.

Read Article β†’

Inside America's Voting Machines

The technical reality behind the black boxes that count our votes reveals a system built on outdated architecture, concentrated corporate control, and security measures that often exist more on paper than in practice.

Read Article β†’