Blog

On protocols, security, and how the internet actually works.

How CDN Cache Poisoning Works

CDN cache poisoning tricks a CDN into caching a malicious response and serving it to all subsequent visitors. One weird request, a lot of collateral.

Read more

VPNs Don't Make You Anonymous

A VPN shifts who can see your traffic from your ISP to the VPN provider. You're trusting a different entity, not eliminating trust.

Read more

BGP: The Protocol That Runs on Trust

BGP routes the internet with no built-in authentication. Any autonomous system can announce any prefix. Route hijacking is trivially possible. Here's how it works and what RPKI is trying to fix.

Read more

Compliance Is Not Security

SOC 2, ISO 27001, PCI DSS — organizations treat compliance as proof of security. It isn't. Compliance is a floor. Security is the actual state of your defenses.

Read more

Security Scores Are Meaningless

I build security scoring systems. I know better than anyone that they don't measure actual security. Here's why I keep building them anyway.

Read more

The TLS Handshake in 7 Steps

Every HTTPS connection starts with a negotiation most developers never think about. Here's exactly what happens in TLS 1.3, step by step.

Read more

"Zero Trust" Is a Marketing Term

Zero Trust started as a legitimate security architecture principle. It has been co-opted by every vendor to mean 'buy our product.' The original idea deserves better.

Read more