Forem

Narnaiezzsshaa Truong profile picture

Narnaiezzsshaa Truong

Security tools for bootstrapped startups

Location Texas, United States Joined Joined on  Personal website https://www.linkedin.com/in/narnaiezzsshaa-truong
Infrastructure Sovereignty and the AI-Proof Skill Stack: What the OpenAI-AWS Deal Reveals About Future-Proof Careers
Cover image for Infrastructure Sovereignty and the AI-Proof Skill Stack: What the OpenAI-AWS Deal Reveals About Future-Proof Careers

Infrastructure Sovereignty and the AI-Proof Skill Stack: What the OpenAI-AWS Deal Reveals About Future-Proof Careers

Comments
7 min read
The Kitsune Protocol: Editorial Deployment of a Mythic Trickster for AI/ML Deception Logic
Cover image for The Kitsune Protocol: Editorial Deployment of a Mythic Trickster for AI/ML Deception Logic

The Kitsune Protocol: Editorial Deployment of a Mythic Trickster for AI/ML Deception Logic

Comments
3 min read
Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems

Comments
3 min read
The Kali Protocol: Editorial Architecture for Refusal, Purge, and Motif Restoration
Cover image for The Kali Protocol: Editorial Architecture for Refusal, Purge, and Motif Restoration

The Kali Protocol: Editorial Architecture for Refusal, Purge, and Motif Restoration

Comments
2 min read
Collapse Spectrum: Philethesia and Apatheia as Editorial Glyphs for AI/ML Systems
Cover image for Collapse Spectrum: Philethesia and Apatheia as Editorial Glyphs for AI/ML Systems

Collapse Spectrum: Philethesia and Apatheia as Editorial Glyphs for AI/ML Systems

Comments
2 min read
The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense
Cover image for The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense

Comments
3 min read
The Chim Lac Protocol: Editorial Architecture for Signal Compression and Motif Drift
Cover image for The Chim Lac Protocol: Editorial Architecture for Signal Compression and Motif Drift

The Chim Lac Protocol: Editorial Architecture for Signal Compression and Motif Drift

Comments
2 min read
The Sphinx Protocol: Encoding Ambiguity, Ascent, and Refusal in AI/ML Systems
Cover image for The Sphinx Protocol: Encoding Ambiguity, Ascent, and Refusal in AI/ML Systems

The Sphinx Protocol: Encoding Ambiguity, Ascent, and Refusal in AI/ML Systems

Comments
3 min read
The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling
Cover image for The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling

The Anansi Protocol: Encoding Metadata Drift and Ambient Surveillance Through West African Storytelling

Comments
3 min read
The Janus Protocol: Strategic Duality and Leadership Dilemmas in Cybersecurity
Cover image for The Janus Protocol: Strategic Duality and Leadership Dilemmas in Cybersecurity

The Janus Protocol: Strategic Duality and Leadership Dilemmas in Cybersecurity

Comments
3 min read
The Ravana Glyph: Encoding Insider Sovereignty and Forensic Collapse in Cybersecurity
Cover image for The Ravana Glyph: Encoding Insider Sovereignty and Forensic Collapse in Cybersecurity

The Ravana Glyph: Encoding Insider Sovereignty and Forensic Collapse in Cybersecurity

Comments
6 min read
The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity
Cover image for The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

The Sun Wukong Framework: Encoding Escalation, Evasion, and Strategic Containment in Cybersecurity

Comments
7 min read
The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence
Cover image for The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence

The Baba Yaga Protocol: Adaptive Gatekeeping and Pre-Authentication Intelligence

Comments
3 min read
The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology
Cover image for The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology

The Dracula Trilogy: Encoding AI-Assisted Attack Lifecycles as Vampire Mythology

3
Comments
8 min read
Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure
Cover image for Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure

Teaching OWASP Top 10 Through Frankenstein: When Creation Without Control Becomes Security Failure

4
Comments
9 min read
I Built Quality Control Into an AI Tool's Architecture—Here's What It Generated
Cover image for I Built Quality Control Into an AI Tool's Architecture—Here's What It Generated

I Built Quality Control Into an AI Tool's Architecture—Here's What It Generated

10
Comments 1
11 min read
What 'Like You're Five' Security Actually Looks Like (Hint: It's Not Condescending)
Cover image for What 'Like You're Five' Security Actually Looks Like (Hint: It's Not Condescending)

What 'Like You're Five' Security Actually Looks Like (Hint: It's Not Condescending)

4
Comments
16 min read
Teaching OWASP Top 10 Through Visual Frameworks
Cover image for Teaching OWASP Top 10 Through Visual Frameworks

Teaching OWASP Top 10 Through Visual Frameworks

Comments
16 min read
loading...