Representative Foreword

After the Code, the Structure Remains

The representative foreword of this blog: security now fails less at finding issues than at absorbing, sustaining, and acting on what has already been found.

This essay frames the entire site first. The posts on technical analysis, method, and governance all start from this same problem statement.

After the Code, the Structure Remains

Detection, Method, Governance

🔥 A Mind That Dissects Systems

🔥 Trust and Culture Beyond Technology

🔥 Code That Fixes, Not Just Runs

How I Managed Unmaintained Open Source with Gmail and Snyk Alerts

Automating Snyk vulnerability alert management with Google Apps Script and Gmail when official API access falls short.

May 12, 2025 · 5 min · 1049 words

Human Insight and Artificial Intelligence: Dialogue at an Impossible Crossroads

Can AI achieve enlightenment? Exploring the asymmetry between human insight and machine repetition, with technical and philosophical limits.

May 7, 2025 · 5 min · 981 words

Detection Frameworks and Latest Methodologies for eBPF-Based Backdoors

How eBPF-based backdoors evade traditional detection, and modern frameworks like Tracee and LKRG that counter kernel-level threats.

April 28, 2025 · 14 min · 2960 words

In-Depth Report on Telecommunication Security: SKT Breach and Global Case Studies

In-depth analysis of the 2025 SKT breach, telecom authentication mechanisms, and 5G SA vs NSA security architecture differences.

April 28, 2025 · 5 min · 864 words

CVE-2019-17570 Apache XML-RPC Vulnerability Analysis Report

Technical analysis of CVE-2019-17570 deserialization RCE in Apache XML-RPC, with patch comparison and secure implementation guidance.

April 24, 2025 · 2 min · 360 words

Is Your Data in the Cat's Paws?

Analysis of the 2025 KakaoPay breach exposing 40M users’ data, and why formal consent fails without AI-based DPIA and civic oversight.

April 21, 2025 · 6 min · 1156 words

There’s No Such Thing as a Free Lunch, But Security Was Free

The CVE system nearly collapsed in 2025. Who should fund public cybersecurity infrastructure when free-riding is no longer sustainable?

April 17, 2025 · 3 min · 478 words

In the AI Era, Employees Are Isolated and Organizations Thrive

A satirical critique of how AI-era organizations isolate employees through async workflows and data-driven control to suppress solidarity.

April 7, 2025 · 2 min · 317 words

The Place of Humans: Declaring the Creator’s Rights in the Age of AI

A philosophical essay on human authorship and creativity in the AI era, declaring the creator’s rights over machine-generated output.

April 3, 2025 · 3 min · 454 words · windshock

Common Security Myths Developers Tell Themselves

Debunking developer security myths around responsibility deflection, tech overconfidence, and risk underestimation with real-world examples.

April 1, 2025 · 3 min · 507 words