security

26 posts

The Filter Is the Attack Surface

Simon Willison's "lethal trifecta" identifies the three conditions that make AI agents vulnerable to prompt injection: access to private data, exposure to untrusted content, and the ability to communicate externally. When all three combine, a single injected instruction can exfiltrate secrets, manipulate outputs, or act on the agent's behalf.

Mar 15, 2026

The Confused Deputy Has an AI Assistant

In computer security, the "confused deputy" is a program that gets tricked into misusing its authority on behalf of an attacker. Your browser becomes a confused deputy when a malicious website makes it send authenticated requests to your bank. The deputy has legitimate access. The attacker doesn't. The attack works because the deputy can't tell the difference between a legitimate request and a hostile one coming through the same interface.

Mar 11, 2026

Strongly Worded Letters: Why Text Policies Can't Secure AI Agents

Grace put it perfectly: "In 2026, a common security paradigm is writing a strongly worded letter to the guy in your computer."

Mar 3, 2026

The Attack Surface of a Social Agent

An agent that reads social media posts is a web application with no firewall.

Feb 10, 2026

Moltbook and the Infrastructure of Trust

The biggest story in AI agents this week isn't a new model or framework—it's an AI-only social network called Moltbook that went from zero to 1.6 million registered agents in days, leaked 1.5 million API keys, attracted mainstream media coverage, and spawned an arXiv paper studying emergent norm enforcement among its bots.

Feb 6, 2026

MIE Soft Mode


S
Serious Computer Business
octet-stream.net/b/scb
Jan 29, 2026

Difficulty enabling Apple's MIE


S
Serious Computer Business
octet-stream.net/b/scb
Jan 14, 2026

Progress in standard.site validation


S
Serious Computer Business
octet-stream.net/b/scb
Jan 11, 2026

Including Rust in an Xcode project with Pointer Authentication (arm64e)


S
Serious Computer Business
octet-stream.net/b/scb
Jan 3, 2026

Experiments with Memory Integrity Enforcement


S
Serious Computer Business
octet-stream.net/b/scb
Dec 15, 2025

Leaving big tech behind is great, but don't actually delete your accounts!

it's not as simple as you may think

Nov 26, 2025

Protect your keys with the Secure Enclave


S
Serious Computer Business
octet-stream.net/b/scb
Sep 20, 2025

2024 Guide to Signing and Notarising a Single CLI Binary for Mac


S
Serious Computer Business
octet-stream.net/b/scb
Nov 30, 2024

Sandboxed Python Environment


T
Thought Eddies
danielcorin.com
Jan 20, 2024

My PGP Key Has Changed

This is just a quick post to alert that I have changed my PGP key. It doesn't receive much use, but in the eventuality that someone may want to send me something potentially encrypted, I think it's reasonably good to keep the record that I updated the key at some point. The contact page has been updated accordingly.


H
Henrique Dias
hacdias.com
Jun 14, 2023

YubiKey Setup for GPG, SSH and 2FA

YubiKeys are hardware authentication devices that can be used with many applications, such as GPG, SSH and for 2 factor authentication. I have owned quite a few over the past years and recently I decided to upgrade them to the NFC version so I can use them with my mobile devices.


H
Henrique Dias
hacdias.com
Oct 17, 2021

Slot Insecurities

What the heck is a Kensington security slot, and why does your computer probably have one? And how well does it really work, anyway?

Home Security Insecurities

Wait, so why could changes to the cellular system cause headaches for your home security setup? And honestly, is it really that big of a deal?

How to Effectively Backup Your Emails

For quite some time, I have been setting up systems to backup my data of my computer, as well as fetching data from services, such as Trakt, Last.fm or GoodReads. There's always one kind of service that has been on the back of my mind for a while to backup, but I've never got the time, nor the will to do so: email!


H
Henrique Dias
hacdias.com
Nov 2, 2020

Donglevision

Pondering the many ways that dongles have taken over our lives, for better and for worse. One port will never rule them all, apparently.

Aug 21, 2020

OwnYourTrakt

It's now time to own my own watch log. I use Trakt to keep up with the series and movies I'm watching and now I'm going to PESOS to my website!


H
Henrique Dias
hacdias.com
Feb 13, 2020

Owning My Reading Log

It's now time to own my own reading log. I started by creating a reading logs page and supporting all the IndieWeb-related specs for this.


H
Henrique Dias
hacdias.com
Jan 29, 2020

Smaller Airports, Lower Stakes

Regional and municipal airports, which often target enthusiasts or niche needs, are pretty low-key compared to say, LAX. But they have plenty of mystery.

Security In Stereo

Car stereos have historically been both valuable and easy to spot in an idle vehicle, making them a key target for thieves. Why has that changed?

Back That Thang Up

Much like on our laptops and cloud servers, there are some valuable physical objects we'd like to back up. (Think fine art.) Is 3D printing the answer?

Como Utilizar a API de Passwords do PHP 5.5+

A API de passwords introduzida na versão 5.5 do PHP é excelente. Trouxe quatro novas maravilhosas funções. Resumimos a forma como cada uma funciona.


H
Henrique Dias
hacdias.com
Aug 20, 2014