4 min read Course Review Applied Cryptography Kodama January 2, 2026 How can you tell the difference between a good cryptography joke and a random string of words?
4 min read Opinion Security by Anonymity Kodama September 15, 2025 Most of us in the security profession have heard the term “security through obscurity”—the flawed model that assumes systems are…
3 min read Course Review Software Dev Process Kodama August 12, 2025 ... I figured this chameleon ought to learn something about the software development process formally for a change... I was…
3 min read Guides $1.8M in My DMs? Must Be Love Kodama June 2, 2025 Just when you think you’ve got the whole crypto investment scam playbook memorized...
5 min read Opinion Social Mayhem: Fighting Fraudsters Ain’t Fair Kodama April 11, 2025 Humans crave connection. Am I right? I mean, that’s pretty much what they were created for, and when that slithering…
4 min read Guides Finding Fraudsters on the Open Web Kodama October 22, 2024 They’re shifty fellows, alright! And that’s saying something coming from a lizard with a mood ring for an epidermis. The…
3 min read Guides Scamming the Scammer Kodama September 11, 2024 🚨 SPOILER ALERT: This article shares IoF (Indicators of Fraud). Yeah, I just made that up. They say knowledge is…
2 min read Course Review Privacy for Professionals Kodama August 13, 2024 In my world, privacy is survival, or as my grandma used to say, “You can’t outrun them, but you sure…
2 min read Course Review Network Security Kodama December 16, 2023 Networking is as fundamental to security as camouflage to a chameleon. So let’s just say I was super eager to…
6 min read Guides Call Me Gordon McPhish Kodama November 12, 2023 Immersed in the academic bubble of Georgia Tech’s Master’s program, it’s pretty common to get a bit of a one-sided…