AI Security
How language models fail, get manipulated, and leak data — and what the research says about defending them.
- Jailbreaking and BoN attacks
- OWASP Top 10 for LLMs
- Prompt injection and flowbreaking
A technical journal covering the security, architecture, and engineering tradeoffs of working with language models.
How language models fail, get manipulated, and leak data — and what the research says about defending them.
The practical tradeoffs behind RAG, fine-tuning, and other ways to specialise a model for a specific domain.
What changes when AI is writing your code — and the security implications that follow.
Most writing on AI security is several steps removed from the original research. We try to go back to the source.
Threat descriptions are more useful when they show what an attack actually looks like, not just that it exists.
The goal is writing that helps you make actual decisions, not just understand that a problem exists.
We note when something is early, uncertain, or likely to change. A lot of this field is still being worked out.
No paywall, no newsletter gate. Writing on AI security and engineering practice.