<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>HelixCipher</title>
    <link>https://HelixCipher.github.io/pages</link>
    <description>Thoughts on security, code, and design.</description>
    <language>en-us</language>
    <lastBuildDate>Sun, 19 Apr 2026 17:37:42 GMT</lastBuildDate>
    <atom:link href="https://HelixCipher.github.io/pages/rss.xml" rel="self" type="application/rss+xml"/>
    <item>
      <title>Building a Cipher Engine from Scratch</title>
      <link>https://HelixCipher.github.io/pages/blog/building_cipher_engine</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/building_cipher_engine</guid>
      <description>Exploring the fundamentals of encryption by building a substitution cipher engine in TypeScript.</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>cryptography</category>
      <category>typescript</category>
      <category>security</category>
    </item>
    <item>
      <title>Do You Know What Your Model Is Doing Right Now?</title>
      <link>https://HelixCipher.github.io/pages/blog/do_you_know_what_your_model_is_doing_right_now</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/do_you_know_what_your_model_is_doing_right_now</guid>
      <description>Do You Know What Your Model Is Doing Right Now?</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>ai</category>
      <category>mlsecurity</category>
      <category>aisecurity</category>
      <category>secureai</category>
    </item>
    <item>
      <title>Exploring Emoji-Based Prompt Manipulation in LLMs</title>
      <link>https://HelixCipher.github.io/pages/blog/exploring_emoji_based_prompt_manipulation_in_llms</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/exploring_emoji_based_prompt_manipulation_in_llms</guid>
      <description>Exploring Emoji-Based Prompt Manipulation in LLMs</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>ai</category>
      <category>aiattacks</category>
      <category>adversarialml</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>From Prompt Injection to Data Leaks: Securing LLMs in Production</title>
      <link>https://HelixCipher.github.io/pages/blog/from_prompt_injection_to_data_leaks_securing_llms_in_production</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/from_prompt_injection_to_data_leaks_securing_llms_in_production</guid>
      <description>From Prompt Injection to Data Leaks: Securing LLMs in Production</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>ai</category>
      <category>cybersecurity</category>
      <category>llm</category>
      <category>security</category>
    </item>
    <item>
      <title>How to Train Your Antivirus: RL to harden malware detectors</title>
      <link>https://HelixCipher.github.io/pages/blog/how_to_train_your_antivirus_rl_to_harden_malware_detectors</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/how_to_train_your_antivirus_rl_to_harden_malware_detectors</guid>
      <description>How to Train Your Antivirus: RL to harden malware detectors</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>ai</category>
      <category>mlsecurity</category>
      <category>adversarialml</category>
      <category>threatmodeling</category>
    </item>
    <item>
      <title>LANTENNA — exfiltrating data from air-gapped systems via Ethernet cables</title>
      <link>https://HelixCipher.github.io/pages/blog/lantenna_exfiltrating_data_from_air_gapped_systems_via_ethernet_cables</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/lantenna_exfiltrating_data_from_air_gapped_systems_via_ethernet_cables</guid>
      <description>LANTENNA — exfiltrating data from air-gapped systems via Ethernet cables</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>iotsecurity</category>
      <category>voiceassistant</category>
      <category>cybersecurity</category>
      <category>threatmodeling</category>
    </item>
    <item>
      <title>Models that deliberately withhold or distort information despite knowing the truth</title>
      <link>https://HelixCipher.github.io/pages/blog/models_that_deliberately_withhold_or_distort_information_despite_knowing_the_truth</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/models_that_deliberately_withhold_or_distort_information_despite_knowing_the_truth</guid>
      <description>Models that deliberately withhold or distort information despite knowing the truth.</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>ai</category>
      <category>aisafety</category>
      <category>aialignment</category>
      <category>machinelearning</category>
    </item>
    <item>
      <title>One Click Is All It Takes: Inside Copilot’s “Reprompt” Vulnerability</title>
      <link>https://HelixCipher.github.io/pages/blog/one_click_is_all_it_takes_inside_copilots_reprompt_vulnerability</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/one_click_is_all_it_takes_inside_copilots_reprompt_vulnerability</guid>
      <description>One Click Is All It Takes: Inside Copilot’s “Reprompt” Vulnerability</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>cybersecurity</category>
      <category>ai</category>
      <category>githubcopilot</category>
      <category>threatintel</category>
    </item>
    <item>
      <title>RAG vs Long-Context: how should you give LLMs your private data?</title>
      <link>https://HelixCipher.github.io/pages/blog/rag_vs_long_context_how_should_you_give_LLMs_your_private_data</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/rag_vs_long_context_how_should_you_give_LLMs_your_private_data</guid>
      <description>RAG vs Long-Context: how should you give LLMs your private data?</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>llm</category>
      <category>rag</category>
      <category>longcontext</category>
      <category>mlops</category>
    </item>
    <item>
      <title>Seeing Humans in 3D Through Wi‑Fi: A Approach to Body Mesh Reconstruction</title>
      <link>https://HelixCipher.github.io/pages/blog/seeing_humans_in_3d_through_wifi_a_approach_to_body_mesh_reconstruction</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/seeing_humans_in_3d_through_wifi_a_approach_to_body_mesh_reconstruction</guid>
      <description>Seeing Humans in 3D Through Wi‑Fi: A Approach to Body Mesh Reconstruction</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>computervision</category>
      <category>wirelesssensing</category>
      <category>machinelearning</category>
      <category>ai</category>
    </item>
    <item>
      <title>Solid-Channel Ultrasound Injection Attack and Defense to Voice Assistants</title>
      <link>https://HelixCipher.github.io/pages/blog/solid-channel ultrasound_injection_attack_and_defense_to_voice_assistants</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/solid-channel ultrasound_injection_attack_and_defense_to_voice_assistants</guid>
      <description>Solid-Channel Ultrasound Injection Attack and Defense to Voice Assistants</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>ai</category>
      <category>aiprivacy</category>
      <category>cybersecurity</category>
      <category>acousticadversarial</category>
    </item>
    <item>
      <title>Solid-Channel Ultrasound Injection Attack and Defense to Voice Assistants</title>
      <link>https://HelixCipher.github.io/pages/blog/solid_channel_ultrasound_injection_attack_and_defense_to_voice_assistants</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/solid_channel_ultrasound_injection_attack_and_defense_to_voice_assistants</guid>
      <description>Solid-Channel Ultrasound Injection Attack and Defense to Voice Assistants</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>ai</category>
      <category>aiprivacy</category>
      <category>cybersecurity</category>
      <category>acousticadversarial</category>
    </item>
    <item>
      <title>Terminal UI: A Design Philosophy</title>
      <link>https://HelixCipher.github.io/pages/blog/terminal_ui_design_philosophy</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/terminal_ui_design_philosophy</guid>
      <description>Why terminal-inspired design is more than aesthetic—it&apos;s a philosophy of focused, efficient interfaces.</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>design</category>
      <category>ui</category>
      <category>terminal</category>
    </item>
    <item>
      <title>The CAPTCHA Lie: How “Human Checks” Are Being Weaponized</title>
      <link>https://HelixCipher.github.io/pages/blog/the_captcha_lie_how_human_checks_are_being_weaponized</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/the_captcha_lie_how_human_checks_are_being_weaponized</guid>
      <description>The CAPTCHA Lie: How “Human Checks” Are Being Weaponized</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>cybersecurity</category>
      <category>malware</category>
      <category>threatintelligence</category>
      <category>infosec</category>
    </item>
    <item>
      <title>This AI Listens… and Knows What You Typed</title>
      <link>https://HelixCipher.github.io/pages/blog/this_ai_listens_and_knows_what_you_typed</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/this_ai_listens_and_knows_what_you_typed</guid>
      <description>This AI Listens… and Knows What You Typed</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>aisecurity</category>
      <category>deeplearning</category>
      <category>cybersecurity</category>
      <category>privacy</category>
    </item>
    <item>
      <title>Threat Modeling Agentic AI Systems: Proactive Strategies for Security and Resilience</title>
      <link>https://HelixCipher.github.io/pages/blog/threat_modeling_agentic_ai_systems_proactive_strategies_for_security_and_resilience</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/threat_modeling_agentic_ai_systems_proactive_strategies_for_security_and_resilience</guid>
      <description>Threat Modeling Agentic AI Systems: Proactive Strategies for Security and Resilience</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>ai</category>
      <category>aiagents</category>
      <category>aisecurity</category>
      <category>threatmodeling</category>
    </item>
    <item>
      <title>Running SQLite in the Browser with WASM</title>
      <link>https://HelixCipher.github.io/pages/blog/wasm-sqlite-browser</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/wasm-sqlite-browser</guid>
      <description>How to use sql.js to run SQLite databases entirely in the browser using WebAssembly.</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>wasm</category>
      <category>sqlite</category>
      <category>javascript</category>
    </item>
    <item>
      <title>What If Privacy Is a Habit, Not a Tool?</title>
      <link>https://HelixCipher.github.io/pages/blog/what_if_privacy_is_a_habit_not_a_tool</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/what_if_privacy_is_a_habit_not_a_tool</guid>
      <description>What If Privacy Is a Habit, Not a Tool?</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>privacy</category>
      <category>metadata</category>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>What If Safety Training Teaches the Model to Hide Better?</title>
      <link>https://HelixCipher.github.io/pages/blog/what_if_safety_training_teaches_the_model_to_hide_better</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/what_if_safety_training_teaches_the_model_to_hide_better</guid>
      <description>What If Safety Training Teaches the Model to Hide Better?</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>aisecurity</category>
      <category>adversarialml</category>
      <category>redteaming</category>
      <category>mlops</category>
    </item>
    <item>
      <title>What Your Bluetooth Accessories Can Reveal Without You Knowing</title>
      <link>https://HelixCipher.github.io/pages/blog/what_your_bluetooth_accessories_can_reveal_without_you_knowing</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/what_your_bluetooth_accessories_can_reveal_without_you_knowing</guid>
      <description>What Your Bluetooth Accessories Can Reveal Without You Knowing</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>cybersecurity</category>
      <category>bluetoothsecurity</category>
      <category>iot</category>
      <category>privacy</category>
    </item>
    <item>
      <title>When Brain Signals Become Stories: Reconstructing Dreams with AI</title>
      <link>https://HelixCipher.github.io/pages/blog/when_brain_signals_become_stories_reconstructing_dreams_with_ai</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/when_brain_signals_become_stories_reconstructing_dreams_with_ai</guid>
      <description>When Brain Signals Become Stories: Reconstructing Dreams with AI</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>ai</category>
      <category>fmri</category>
      <category>airesearch</category>
      <category>machinelearning</category>
    </item>
    <item>
      <title>When browser extensions become live surveillance</title>
      <link>https://HelixCipher.github.io/pages/blog/when_browser_extensions_become_live_surveillance</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/when_browser_extensions_become_live_surveillance</guid>
      <description>When browser extensions become live surveillance</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>mlsecurity</category>
      <category>browsersecurity</category>
      <category>supplychainsecurity</category>
      <category>privacy</category>
    </item>
    <item>
      <title>When light becomes a weapon: laser-based command injection attacks on voice assistants</title>
      <link>https://HelixCipher.github.io/pages/blog/when_light_becomes_a_weapon_laser_based_command_injection_attacks_on_voice_assistants</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/when_light_becomes_a_weapon_laser_based_command_injection_attacks_on_voice_assistants</guid>
      <description>When light becomes a weapon: laser-based command injection attacks on voice assistants</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>iotsecurity</category>
      <category>infosec</category>
      <category>threatmodeling</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>When Phishing Learns to Think: AI-Powered Kits and the Next Wave of Account Takeovers</title>
      <link>https://HelixCipher.github.io/pages/blog/when_phishing_learns_to_think_ai_powered_kits_and_the_next_wave_of_account_takeovers</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/when_phishing_learns_to_think_ai_powered_kits_and_the_next_wave_of_account_takeovers</guid>
      <description>When Phishing Learns to Think: AI-Powered Kits and the Next Wave of Account Takeovers</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>cybersecurity</category>
      <category>phishing</category>
      <category>mfa</category>
      <category>threatintel</category>
    </item>
    <item>
      <title>When Storage Becomes Biology, Security Stops Being Purely Digital</title>
      <link>https://HelixCipher.github.io/pages/blog/when_storage_becomes_biology_security_stops_being_purely_digital</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/when_storage_becomes_biology_security_stops_being_purely_digital</guid>
      <description>When Storage Becomes Biology, Security Stops Being Purely Digital</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>cybersecurity</category>
      <category>biosecurity</category>
      <category>datastorage</category>
      <category>informationsecurity</category>
    </item>
    <item>
      <title>When Your Mouse Becomes a Microphone</title>
      <link>https://HelixCipher.github.io/pages/blog/when_your_mouse_becomes_a_microphone</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/when_your_mouse_becomes_a_microphone</guid>
      <description>When Your Mouse Becomes a Microphone</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>securityresearch</category>
      <category>sidechannel</category>
      <category>privacy</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Who Designs the Future of AI When AI Designs Itself?</title>
      <link>https://HelixCipher.github.io/pages/blog/who_designs the_future_of_ai_when_ai_designs_itself</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/who_designs the_future_of_ai_when_ai_designs_itself</guid>
      <description>Who Designs the Future of AI When AI Designs Itself?</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>ai</category>
      <category>airesearch</category>
      <category>machinelearning</category>
      <category>automl</category>
    </item>
    <item>
      <title>Who’s Really Controlling Your Hiring Algorithm?</title>
      <link>https://HelixCipher.github.io/pages/blog/whos_really_controlling_your_hiring_algorithm</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/whos_really_controlling_your_hiring_algorithm</guid>
      <description>Who’s Really Controlling Your Hiring Algorithm?</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>ai</category>
      <category>mlsecurity</category>
      <category>aisecurity</category>
      <category>responsibleai</category>
    </item>
    <item>
      <title>Zero-Day Exploit in the Wild</title>
      <link>https://HelixCipher.github.io/pages/blog/zero_day_exploit_in_the_wild</link>
      <guid isPermaLink="true">https://HelixCipher.github.io/pages/blog/zero_day_exploit_in_the_wild</guid>
      <description>Zero-Day Exploit in the Wild</description>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>mobilesecurity</category>
      <category>cybersecurity</category>
      <category>androidsecurity</category>
      <category>threatintel</category>
    </item>
  </channel>
</rss>