DEV Community

Narnaiezzsshaa Truong profile picture

Narnaiezzsshaa Truong

Security tools for bootstrapped startups

Location Texas, United States Joined Joined on  Personal website https://www.linkedin.com/in/narnaiezzsshaa-truong
8 Week Community Wellness Streak
Xano AI-Powered Backend Challenge Completion
DEV Challenge Volunteer Judge
2
4 Week Community Wellness Streak
2 Week Community Wellness Streak
Writing Debut
1 Week Community Wellness Streak
Top 7
The 48-Hour Collapse of Moltbook

The 48-Hour Collapse of Moltbook

11
Comments 1
5 min read

Want to connect with Narnaiezzsshaa Truong?

Create an account to connect with Narnaiezzsshaa Truong. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
The Architecture of Risk: Why Agent Substrates Are Manipulation Engines

The Architecture of Risk: Why Agent Substrates Are Manipulation Engines

2
Comments
7 min read
Hooks Are Not Governance: Why Deterministic Filters Can't Contain Agent-Layer Risk

Hooks Are Not Governance: Why Deterministic Filters Can't Contain Agent-Layer Risk

1
Comments 1
4 min read
QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors

QR Codes Were Just the Entry Point: A Technical Breakdown of Post-Viral Social Engineering Vectors

6
Comments 2
2 min read
OSI Layer 10—The Cartographer: Ecosystems, Incentives, and the Economics of Security

OSI Layer 10—The Cartographer: Ecosystems, Incentives, and the Economics of Security

5
Comments 2
4 min read
Why Knowing the Model Isn't Systems Thinking

Why Knowing the Model Isn't Systems Thinking

2
Comments
2 min read
We're Misdiagnosing "Knowledge Collapse." The Real Problem Is Private AI Epistemics

We're Misdiagnosing "Knowledge Collapse." The Real Problem Is Private AI Epistemics

7
Comments
2 min read
The Baselines Most Teams Don't Know They're Missing

The Baselines Most Teams Don't Know They're Missing

1
Comments
2 min read
Why We Suddenly Have Developers Who Can't Think in Systems

Why We Suddenly Have Developers Who Can't Think in Systems

93
Comments 34
3 min read
The 360 Vantage: Why Security Requires Peripheral Vision

The 360 Vantage: Why Security Requires Peripheral Vision

Comments
3 min read
The Human Fear of Erasure (and Why It Shows Up in Your Systems)

The Human Fear of Erasure (and Why It Shows Up in Your Systems)

2
Comments
4 min read
OSI Layer 9—The Council: Governance, Power, and the Politics of Security

OSI Layer 9—The Council: Governance, Power, and the Politics of Security

1
Comments
4 min read
AI Music Isn't a Creative Problem—It's a Governance Failure Mode

AI Music Isn't a Creative Problem—It's a Governance Failure Mode

Comments
4 min read
Operational Indistinguishability: A Technical Guide to the Doppelgänger Framework

Operational Indistinguishability: A Technical Guide to the Doppelgänger Framework

Comments
4 min read
The Epistemology of Offense and Defense: A Foundational Framework

The Epistemology of Offense and Defense: A Foundational Framework

Comments
6 min read
Local-First Is Actually a Governance Revolution

Local-First Is Actually a Governance Revolution

Comments
4 min read
RouterEval: An Evaluation Harness for LLM Routing Policies

RouterEval: An Evaluation Harness for LLM Routing Policies

Comments
6 min read
The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

The Mirror & Its Twin: AI, Apprenticeship, and the Hollowing of Cyber Ops

1
Comments
2 min read
If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML

If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML

1
Comments
3 min read
Stop Trying to "Push Through It": A Developer's Guide to Internal Governance

Stop Trying to "Push Through It": A Developer's Guide to Internal Governance

3
Comments 1
3 min read
Build a Self-Evolving Memory Agent in 150 Lines

Build a Self-Evolving Memory Agent in 150 Lines

Comments
4 min read
EIOC Guard™ Runbook: SOC‑Style Emotional Incident Response

EIOC Guard™ Runbook: SOC‑Style Emotional Incident Response

1
Comments
3 min read
How To Detect Memory Drift In Production Agents

How To Detect Memory Drift In Production Agents

1
Comments
3 min read
Why Memory Architecture Matters More Than Your Model

Why Memory Architecture Matters More Than Your Model

1
Comments
2 min read
OSI Layer 8—The Sovereign: Emotional Architecture, Organizational Mythology, and the Security of Human Intention

OSI Layer 8—The Sovereign: Emotional Architecture, Organizational Mythology, and the Security of Human Intention

1
Comments
4 min read
Second-Half Routing: From Traffic Control to Collective Intelligence

Second-Half Routing: From Traffic Control to Collective Intelligence

Comments
5 min read
How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines

How the Chimera Explains Shadow AI Risk in Enterprise ML Pipelines

Comments
1 min read
Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI

Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI

Comments
6 min read
The Creator's Paradox in the AI Era: How to Stay Generative When Everything Gets Scraped

The Creator's Paradox in the AI Era: How to Stay Generative When Everything Gets Scraped

Comments
2 min read
EIOC: A Detection Framework for Human‑Layer Security

EIOC: A Detection Framework for Human‑Layer Security

Comments
3 min read
The Democratization Fallacy: How 'AI for Everyone' Became a Modern Myth

The Democratization Fallacy: How 'AI for Everyone' Became a Modern Myth

Comments
3 min read
OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic

OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic

Comments
4 min read
The Labors of Heracles as Risk Management for SMBs

The Labors of Heracles as Risk Management for SMBs

Comments
3 min read
Kill Chain Analysis for a Toxic Meeting

Kill Chain Analysis for a Toxic Meeting

Comments
3 min read
Tech Horror Codex: Technical Debt

Tech Horror Codex: Technical Debt

Comments
2 min read
OSI Layer 6—Presentation Layer Security

OSI Layer 6—Presentation Layer Security

Comments
4 min read
Tech Horror Codex: Vendor Lock‑In

Tech Horror Codex: Vendor Lock‑In

Comments
2 min read
EIOC as a Detection Model: From Framework to Code

EIOC as a Detection Model: From Framework to Code

Comments
5 min read
Tech Horror Codex: Data Gravity

Tech Horror Codex: Data Gravity

Comments
2 min read
Tech Horror Codex: Substrate Sovereignty

Tech Horror Codex: Substrate Sovereignty

Comments
2 min read
Computers Are Dumb. That’s Why AI Feels So Dangerous—and So Useful.

Computers Are Dumb. That’s Why AI Feels So Dangerous—and So Useful.

Comments
3 min read
OSI Layer 5—Session Layer Security

OSI Layer 5—Session Layer Security

Comments
4 min read
OSI Layer 4—The Steward

OSI Layer 4—The Steward

Comments
4 min read
Model‑First Reasoning Myth‑Tech: One Mechanism, Two Dialects

Model‑First Reasoning Myth‑Tech: One Mechanism, Two Dialects

Comments
2 min read
EIOC in Human-AI Interaction: A Framework for Trust, Agency, and Collaborative Intelligence

EIOC in Human-AI Interaction: A Framework for Trust, Agency, and Collaborative Intelligence

5
Comments
3 min read
When Inefficiency Has a Price Tag: Why "Good Habits" Aren't Optional in SMB/S Software Development

When Inefficiency Has a Price Tag: Why "Good Habits" Aren't Optional in SMB/S Software Development

2
Comments
3 min read
When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means

When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means

Comments
4 min read
EIOC for Engineers, PMs, and AI Safety Practitioners

EIOC for Engineers, PMs, and AI Safety Practitioners

Comments
3 min read
Anansi’s Web as Neural Architecture: From Folklore to Framework

Anansi’s Web as Neural Architecture: From Folklore to Framework

Comments
2 min read
Hero's Journey Security Assessment API—Mythological Framework Meets SMB Cybersecurity

Xano AI-Powered Backend Challenge: Public API Submission

Hero's Journey Security Assessment API—Mythological Framework Meets SMB Cybersecurity

4
Comments
5 min read
A Company Spam-Commented on My Article About Performative Expertise—And Proved My Point

A Company Spam-Commented on My Article About Performative Expertise—And Proved My Point

Comments
5 min read
Emotional Indicators of Compromise: A New Frontier in Security Awareness

Emotional Indicators of Compromise: A New Frontier in Security Awareness

Comments 1
3 min read
Dual-Use Mythological Frameworks: How Narada Encodes Both Attack and Defense in AI/ML Security

Dual-Use Mythological Frameworks: How Narada Encodes Both Attack and Defense in AI/ML Security

Comments
5 min read
The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift

The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift

Comments
2 min read
The Ravana Protocol: Encoding Multi-Agent Orchestration and Model Stacking in AI/ML Systems

The Ravana Protocol: Encoding Multi-Agent Orchestration and Model Stacking in AI/ML Systems

Comments 1
3 min read
The Equalizer and the Integrator: AI, Cybersecurity, and the Human Insight Imperative

The Equalizer and the Integrator: AI, Cybersecurity, and the Human Insight Imperative

4
Comments
5 min read
The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

The Vulnerability Wardrobe: What Your Security Posture Is Really Wearing

3
Comments 2
4 min read
When Mastery Gets Flagged: AI Detectors, False Positives, and the Inversion of Trust

When Mastery Gets Flagged: AI Detectors, False Positives, and the Inversion of Trust

5
Comments 4
2 min read
Beyond Filters: Rearchitecting Prompt Injection Defense

Beyond Filters: Rearchitecting Prompt Injection Defense

Comments
5 min read
When Noise Becomes Motif: Defending Originality in the Age of Opportunistic Attention

When Noise Becomes Motif: Defending Originality in the Age of Opportunistic Attention

Comments
6 min read
loading...