eIDAS 2.0 vs. Korea’s Digital Identity System: A Comparative Analysis
Comparative analysis of EU eIDAS 2.0 wallet-based identity and Korea’s mobile ID system across governance, privacy, and operations.
Representative Foreword
The representative foreword of this blog: security now fails less at finding issues than at absorbing, sustaining, and acting on what has already been found.
This essay frames the entire site first. The posts on technical analysis, method, and governance all start from this same problem statement.

Detection, Method, Governance
Comparative analysis of EU eIDAS 2.0 wallet-based identity and Korea’s mobile ID system across governance, privacy, and operations.
Comparing static vs memory-based malware detection using Amadey, showing why runtime YARA rules outperform file-hash approaches.
How transparent internal vulnerability visibility drives remediation through accountability and deterrence without formal punishment.
Why continuous attack surface management is critical in 2025, covering AI-driven discovery, shadow IT, and zero trust integration.
A comprehensive report presenting a roadmap for practical security improvement and field leadership, centered around the debate on WAF and the gap between philosophy and execution.
A deep dive into why common SSRF defense code is often incomplete, real-world bypasses, and practical, layered mitigation strategies for developers and security engineers.
Theoretical RCE risks in OpenStack Nova’s exception serialization via oslo.messaging, with PoC scenarios and defense patterns.
A technical analysis of how BYOI, BYOVD, DLL hijacking, and service abuse shifted endpoint attacks from EDR bypass to EDR kill between 2020 and 2025.
Graph-based analysis of Single Points of Failure in cybersecurity, using weighted path enumeration to identify critical infrastructure nodes.
Mitigation guide for CVE-2022-24434 in the Dicer module affecting Multer and Express, with practical dependency chain fixes.