Stan Kaminsky

165 articles

A practical guide to secure vibe-coding for small businesses

How to mitigate vibe-coding risks

Building a functional app without programming skills is now a possibility, but maintaining it and ensuring cybersecurity remains a challenge. Here are several protective measures that even non-technical creators can implement.

Protecting LLM chats from the eavesdropping Whisper Leak attack

How to eavesdrop on a neural network

The Whisper Leak attack allows its perpetrator to guess the topic of your conversation with an AI assistant — without decrypting the traffic. We explore how this is possible, and what you can do to protect your AI chats.