Security architecture

Security

Threat models, control design, reviews, and field notes—featured essays open from the previews below.

Preview: O-Day Pipeline assembled by an agentic swarm, showing five exploit pipeline stages.

Ilithios BYOVD pipeline analysis

Interactive walkthrough of Marcus Hutchins' experiment: driver triage, reverse engineering flow, LLM reasoning failures, and exploit economics.

Feature Essay · April 2026

The Case for a Dangerous AI

A governed offensive-capable defensive AI argument: control primitives, policy timeline, and security reality under nation-state pressure.

Preview: You vibe code, I conduct code — stylized illustration (opens Conduct code page).

Conduct code

Poster page, outbound links, and the full image—select the card to open it.

Preview: horror-poster art—gateway monster and Copilot-style keys (opens proxy article).

The proxy that ate your Copilot keys

AI gateways, logging, and blast radius—select the card to read the full note.

Preview: bar chart of published CVE counts 2021–2025 (opens full essay).

CISO leverage and a security architecture CoE

AI-era delivery, five years of CVE publication data (chart), myth vs measurable tide, and standing up a center of excellence—with citations.