(Philosophy) Egyptian Magic and Theory of Computation

What is computation? An introduction for humans

What Hegel would have said about Closed Source Software

Software already runs inside your head!!

Neo-Nietzschian Decadence of Choice in Closed Source Software

Public Disclosure Shaming SO HOT RIGHT NOW

[InfoSec Rant] "Unspecifying" vulnerabilities is a vulnerability for vulnerability specification.

I started a youtube channel!

[Meta-Analysis] Rick n Morty S1E10 : Broken Authentication Joke

[Meta Analysis] Rick n Morty S3E1 : Rick's Anti-Tamper System

[Meta Analysis] Rick n Morty S1E10 : The Internet Privacy Episode (Part 1)

[meta analysis] Rick n Morty S1E4 : Simulation Theory and Machine Learning

[Meta Analysis] Rick 'n Morty S3E1: The Hacker's Episode

[Philosophy] A discussion on the realities of belief

[Philosophy] Thoughts on the ontological duality of software data and instruction

[Philosophy] The ontology of software

Context based Entropy : How to use keyed-steganography

[OPINION] How AI will change Information Security

Why Security exceptions shouldn't exist.

Why geeks should "get" fashion

[RANT] Why Browsers are a crazy idea

[Idea] False Biased Extraction for SQLi using Prime numbers

Abusing WebVTT and CORS for fun and profit

Stealing Secrets with CSS : Cross Origin CSS Attacks

The Vaudenay Attack : A practical example

Padding Oracle Attacks : The other padding that killed your secret key

Automated DEX Decompilation using Androguard part II: Dex2Java

Automated DEX Decompilation using Androguard

About addJavascriptInterface abuse in Android Browsers

Path Traversal Vulnerability in OI File Manager for Android

Path Traversal Vulnerability in 'com.smartwho.SmartFileManager' 3.1.2 for Android

Critical Information Leakage Vulnerabilities in 'Next Browser' 1.16 for Android

Path Traversal Vulnerability in File Explorer (FX) for Android Cookie Based XSS

Even Faster Blind SQL injection methods

Grepping for Glory : using grep to uncover Android Application Level Vulns