DEV Community

# privacy

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
🔥 The Agent Registry Is a Trojan Horse

🔥 The Agent Registry Is a Trojan Horse

7
Comments 1
2 min read
Snowflake

Snowflake

Comments
1 min read
Say Hello to example-counter and example-bboard

Say Hello to example-counter and example-bboard

Comments
3 min read
Manage user cookie consent with Google Tag Manager: a step-by-step guide

Manage user cookie consent with Google Tag Manager: a step-by-step guide

Comments
22 min read
Manage user cookie consent with Google Tag Manager: Adapting to CookieConsent v3

Manage user cookie consent with Google Tag Manager: Adapting to CookieConsent v3

Comments
4 min read
BitChat: Offline Bluetooth Mesh Messaging Without SIM, Wi-Fi or Servers

BitChat: Offline Bluetooth Mesh Messaging Without SIM, Wi-Fi or Servers

Comments
2 min read
Is Legally Non-Compliant Behavior a Security Vulnerability?

Is Legally Non-Compliant Behavior a Security Vulnerability?

Comments
2 min read
How to Block AI Web Scrapers on Your WordPress Site with robots.txt (2025 Update)

How to Block AI Web Scrapers on Your WordPress Site with robots.txt (2025 Update)

Comments
2 min read
SSH Over Tor: Cool, Practical, or Just Tinfoil Hats?

SSH Over Tor: Cool, Practical, or Just Tinfoil Hats?

Comments
3 min read
Are Browser AI Agents a Security Time Bomb? Unpacking the Risks and How to Stay Safe

Are Browser AI Agents a Security Time Bomb? Unpacking the Risks and How to Stay Safe

Comments
5 min read
How a Venmo Setting Exposed a National Security & Privacy Risk — A Digital Forensics View on Privacy by Design

How a Venmo Setting Exposed a National Security & Privacy Risk — A Digital Forensics View on Privacy by Design

1
Comments
4 min read
WireGuard DoV (DNS-over-VPN)

WireGuard DoV (DNS-over-VPN)

1
Comments 1
2 min read
Keeping Your JSON Private: How Online Tools Handle Your Data (and How to Pick Safe Ones)

Keeping Your JSON Private: How Online Tools Handle Your Data (and How to Pick Safe Ones)

Comments
2 min read
What Metadata Reveals About You?

What Metadata Reveals About You?

Comments
5 min read
Understanding RSA vs. AES: Which Encryption Should You Use?

Understanding RSA vs. AES: Which Encryption Should You Use?

Comments
1 min read
How I Built a Chrome Extension to Unshorten URLs and Remove Trackers (URL Unshortener Pro)

How I Built a Chrome Extension to Unshorten URLs and Remove Trackers (URL Unshortener Pro)

Comments
1 min read
Mind Your Data

Mind Your Data

Comments
2 min read
TLSNotary ― Flow Overview

TLSNotary ― Flow Overview

Comments
2 min read
Remove Internet Junk from Ground Up: A DNS-Based Approach

Remove Internet Junk from Ground Up: A DNS-Based Approach

Comments
3 min read
I built Litlyx because I was done with all the other tools.

I built Litlyx because I was done with all the other tools.

5
Comments
2 min read
Websites Can Access Your Location Without You Noticing — I Made a Tool to Catch That

Websites Can Access Your Location Without You Noticing — I Made a Tool to Catch That

Comments
2 min read
Session Keys Aren’t Enough — Here’s How to Store Keys Without Holding Them

Session Keys Aren’t Enough — Here’s How to Store Keys Without Holding Them

2
Comments 1
3 min read
I built a privacy-first authentication system at 17 - feedback?

I built a privacy-first authentication system at 17 - feedback?

1
Comments
2 min read
Rethinking Web3 Privacy: What You Can Actually Build with Sapphire

Rethinking Web3 Privacy: What You Can Actually Build with Sapphire

3
Comments 1
4 min read
Why Hackers Want Your Personal Data (And How They Use It)

Why Hackers Want Your Personal Data (And How They Use It)

2
Comments
3 min read
loading...