📰 Dev.to · Narnaiezzsshaa Truong
Articles from Dev.to · Narnaiezzsshaa Truong · 26 articles · Updated every 3 hours · View all reads
All
⚡ AI Lessons (11244)
ArXiv cs.AIDev.to · FORUM WEBDev.to AIForbes InnovationOpenAI NewsHugging Face Blog

Dev.to · Narnaiezzsshaa Truong
5d ago
The Hollow Shield and the Foundation: A Mythic‑Operational Reframing of “The End of Cybersecurity”
Every few years, someone declares that cybersecurity is ending. The latest version frames AI‑assisted...

Dev.to · Narnaiezzsshaa Truong
4w ago
Youth Shield: Teaching Emotional Drift Literacy as a Security Skill
Youth Shield began as a stubborn refusal to accept that young people should face AI-accelerated fraud...

Dev.to · Narnaiezzsshaa Truong
1mo ago
Poking a 200-Line GPT Until It Breaks (So You Understand Bigger Models Better)
Big LLMs are opaque. Billions of parameters, months of training, layers of RLHF and safety...

Dev.to · Narnaiezzsshaa Truong
1mo ago
Orchids as Cybersecurity, AI, and ML Systems: A Substrate-Layer Mapping
Orchids are not decorative. They are adversarial survivors, sparse optimizers, identity-first...

Dev.to · Narnaiezzsshaa Truong
2mo ago
AI Music Isn't a Creative Problem—It's a Governance Failure Mode
AI-generated artists are blowing up on Spotify. Velvet Sundown. Aventhis. Breaking Rust. Millions of...

Dev.to · Narnaiezzsshaa Truong
2mo ago
RouterEval: An Evaluation Harness for LLM Routing Policies
How do you know if your router is actually better? A code-oriented framework for A/B testing routing...

Dev.to · Narnaiezzsshaa Truong
2mo ago
If Cybersecurity Were a Snack Table: A Whimsical Mapping of Food to Cyber/AI/ML
Brussels sprouts as model hardening. Pizza as Zero Trust. Donuts defined by their holes. A culinary...

Dev.to · Narnaiezzsshaa Truong
3mo ago
Second-Half Routing: From Traffic Control to Collective Intelligence
Most LLM routing is still traffic control. Here's how to build routers that reason, search, and...

Dev.to · Narnaiezzsshaa Truong
3mo ago
Data Poisoning as Mythic Corruption: How Attackers Taint the Well of AI
In mythology, corruption spreads from poisoned wells and cursed artifacts. Data poisoning follows the...

Dev.to · Narnaiezzsshaa Truong
3mo ago
Model‑First Reasoning Myth‑Tech: One Mechanism, Two Dialects
Why AI agents and humans need the same cognitive primitive: representation before reasoning. ...

Dev.to · Narnaiezzsshaa Truong
3mo ago
EIOC in Human-AI Interaction: A Framework for Trust, Agency, and Collaborative Intelligence
AI systems are no longer passive functions. They're interactive agents that reason, generate, and...

Dev.to · Narnaiezzsshaa Truong
3mo ago
When AI Becomes the Hacker: What Anthropic's Espionage Report Really Means
I. The Moment We've Been Waiting For Anthropic just published something unprecedented: a...

Dev.to · Narnaiezzsshaa Truong
3mo ago
EIOC for Engineers, PMs, and AI Safety Practitioners
A practical framework for building, shipping, and governing AI systems that interact with...

Dev.to · Narnaiezzsshaa Truong
4mo ago
Anansi’s Web as Neural Architecture: From Folklore to Framework
Panel 1: Anansi’s Mythic Web In West African folklore, Anansi spins webs of story and...

Dev.to · Narnaiezzsshaa Truong
4mo ago
Dual-Use Mythological Frameworks: How Narada Encodes Both Attack and Defense in AI/ML Security
When mythic glyphs operate in both offensive and defensive contexts, systems become sovereign through...

Dev.to · Narnaiezzsshaa Truong
4mo ago
The Narada Attack: Editorial Architecture for Chaos Injection and Adversarial Drift
How the mythic messenger compresses adversarial input into motif collapse and editorial exposure for...

Dev.to · Narnaiezzsshaa Truong
4mo ago
Adversarial Thinking Template: Working Backward from the Goal
Threat modeling, penetration testing, and security design all share a core discipline: thinking like...

Dev.to · Narnaiezzsshaa Truong
4mo ago
Why Your Parental Control API Will Fail: Architectural Lessons from TikTok, Roblox, and YouTube
As a cybersecurity professional transitioning from pharmacy tech to cloud security (CompTIA A+...

Dev.to · Narnaiezzsshaa Truong
5mo ago
Beyond Mapping Adversarial Subspaces: Why AI Security Needs Architectural Defenses
Disesdi Susanna Cox and Niklas Bunzel's recent paper, "Quantifying the Risk of Transferred Black Box...

Dev.to · Narnaiezzsshaa Truong
5mo ago
The Kitsune Protocol: Editorial Deployment of a Mythic Trickster for AI/ML Deception Logic
How a mythological shapeshifter becomes a forensic glyph for adversarial camouflage, prompt...

Dev.to · Narnaiezzsshaa Truong
5mo ago
Myth-Tech Master Architecture: Cross-Cultural Mapping of Mythological Archetypes to AI/ML Systems
When ancient myths meet modern systems, editorial glyphs emerge. I. Introduction: The...

Dev.to · Narnaiezzsshaa Truong
5mo ago
The Kali Protocol: Editorial Architecture for Refusal, Purge, and Motif Restoration
How the mythic blade compresses hallucination collapse into editorial refusal and sovereign...

Dev.to · Narnaiezzsshaa Truong
5mo ago
Collapse Spectrum: Philethesia and Apatheia as Editorial Glyphs for AI/ML Systems
When systems collapse, they do so by feeling too much—or not at all. Philethesia: Motif...

Dev.to · Narnaiezzsshaa Truong
5mo ago
The Tri-Glyph Protocol: Chim Lac, Kitsune, and Anansi in AI/ML Collapse and Editorial Defense
The Tri-Glyph Protocol: Chim Lạc, Kitsune, and Anansi in AI/ML Collapse and Editorial...
DeepCamp AI