
The Salty Hash
Tips, tricks, pointers and perspectives on building secure, testable, maintainable apps. Thoughts and observations about security and privacy from IronCore Labs.

Patrick Walsh
Scholar, dreamer, creator, adventurer, hacker, leader and observer. Advocate for privacy and security. CEO IronCore Labs.

Riah Lawry
Collector of ideas and facts. Often inspired by long walks. Name sounds like Mariah, but it’s Riah.

Bob Wall
CTO at IronCore Labs, a data security startup. Into encryption, cloud computing, AI & machine learning, other geeky stuff. Music junkie.
Latest Posts

AI Security Risks Are Real — Here’s 12 Questions to Ask Your Software Vendor
As businesses integrate AI-powered features into their software, security remains a top concern. Vendors are promising cutting-edge AI…

10 Essential Security Steps Before Launching Your AI Feature
AI features are taking over the software industry with almost any product you use today getting “enhanced” with AI features. Unfortunately…

OWASP’s Updated Top 10 LLM Includes Vector and Embedding Weaknesses
The Update Looks Beyond Models to the Whole AI Stack

Privacy Guide to Apple Intelligence with ChatGPT
Patrick’s Privacy Practices Part 3

Private Communications for Email and Text Messages
Patrick’s Privacy Practices Part 2

Identity Theft Protection Checklist
Patrick’s Privacy Practices Part 1

Build Your Own Application-Layer Encryption?
Non-obvious Considerations and Why It’s More Complex Than It May Seem

Using MySQL’s Built-in Encryption: A Terrible Idea
6 Reasons To Avoid MySQL’s Native Encryption Functions

Application-layer Encryption (ALE) Demo Using a Notes App
It can be difficult to demo encryption. If you do it right, the encryption is invisible to users, but the hackers only see garbage data…

How to talk to the business about AI security risks
If you’re on a security or engineering team and you’ve read our Securing Gen-AI White Paper, you probably understand that the addition of…
Reviews
Login to submit your review.