The E-Signature Audit Trail Is Theater
The e-signature industry has conflated legally valid with cryptographically provable for 25 years. Courts are beginning to notice the difference, and so should you....
9 articles with this tag
The e-signature industry has conflated legally valid with cryptographically provable for 25 years. Courts are beginning to notice the difference, and so should you....
How to architect AI trust with deterministic guardrails: Pydantic validators, Redis kill switches, and OAuth scopes. A four-level framework from building financial AI....
Quantum computing won't break cryptocurrency for 15-30 years. Meanwhile, social engineering, bridge exploits, and insider threats stole $3.4 billion in 2025....
Modern browsers run untrusted code from millions of sources daily and contain threats successfully. Browser-based applications inherit security properties that native apps can't match....
A BBS sysop friend got hacked through social engineering in 1987. Watching it happen taught me that the most dangerous vulnerabilities aren't in code - they're in assumptions about trust....
The security industry profits from fear. Most breaches have minimal impact while companies overspend on exotic threats....
How a homemade web crawler in 1993 crashed a Los Alamos server, the birth of robots.txt, and why AI companies are breaking the web etiquette that held for 30 years....
In the 1990s, I built RUM (Real User Mail) - a challenge-response system to fight spam. It worked. I never released it. Years later, the industry reinvented it....
ASR systems need training data. Training data contains sensitive audio. How federated learning solves the conflict between ML requirements and privacy laws....