Blog
Technical notes, investigations, and security research.
Mobile Device Forensics: iOS vs Android
Comprehensive guide to extracting and analyzing evidence from mobile devices. Tools, techniques, and legal considerations.
Maintaining Chain of Custody in Digital Evidence
Best practices for preserving digital evidence integrity. Hashing, documentation, and courtroom admissibility standards.
Security Implications of RAG AI Systems
Exploring vulnerabilities in Retrieval-Augmented Generation systems. Prompt injection, data poisoning, and mitigation strategies.
Detecting Deepfakes: AI-Powered Forensics
Using machine learning to identify synthetic media. Techniques for detecting manipulated audio, video, and images.
IoT Security: From Smart Homes to Industrial Systems
Common vulnerabilities in IoT devices and networks. Firmware analysis, network segmentation, and threat modeling.
Forensic Investigation of IoT Devices
Extracting and analyzing evidence from smart devices. Memory dumps, log analysis, and timeline reconstruction.
More articles coming soon. Subscribe to my newsletter or follow me on social media for updates.