DEV Community

# privacy

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Your photos may still contain GPS metadata after editing

Your photos may still contain GPS metadata after editing

Comments
1 min read
Your Search History Is a Goldmine: Heres Whos Mining It

Your Search History Is a Goldmine: Heres Whos Mining It

Comments
6 min read
Sovereign Communication: Why Every Secure Messaging App Is Still Broken — And How to Fix It From First Principles

Sovereign Communication: Why Every Secure Messaging App Is Still Broken — And How to Fix It From First Principles

Comments
10 min read
I Built a Personal Finance App That Doesn't Touch Your Data

I Built a Personal Finance App That Doesn't Touch Your Data

Comments
6 min read
Designing public vs. private state: what goes where and why

Designing public vs. private state: what goes where and why

1
Comments
7 min read
How we built a decentralized residential VPN with USDC payouts on Solana

How we built a decentralized residential VPN with USDC payouts on Solana

Comments
2 min read
Cold Boot Attacks: Why Disk Encryption Doesn't Protect a Running Computer

Cold Boot Attacks: Why Disk Encryption Doesn't Protect a Running Computer

Comments
4 min read
Building a Privacy-First URL Shortener on Blockchain

Building a Privacy-First URL Shortener on Blockchain

Comments
1 min read
Why macOS Keeps Resetting Your Default Browser (and How to Fix It Forever)

Why macOS Keeps Resetting Your Default Browser (and How to Fix It Forever)

Comments
3 min read
Why I'm building free PDF and image tools that never touch a server

Why I'm building free PDF and image tools that never touch a server

Comments
3 min read
The Protective Legitimacy Score: How to Tell Whether a Trust Claim Is Structural

The Protective Legitimacy Score: How to Tell Whether a Trust Claim Is Structural

Comments
4 min read
How I built a private audio transcription tool in browser using Transformers.js

How I built a private audio transcription tool in browser using Transformers.js

Comments
4 min read
Post-Quantum Cryptography: What Happens to Your Encrypted Data When Quantum Arrives

Post-Quantum Cryptography: What Happens to Your Encrypted Data When Quantum Arrives

Comments
5 min read
6 regexes for detecting PII in event payloads

6 regexes for detecting PII in event payloads

Comments
8 min read
Your VPN Might Be Leaking Your Real IP Through WebRTC

Your VPN Might Be Leaking Your Real IP Through WebRTC

Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.