Latest Articles

AI-Powered Portfolio Management: Advanced Guide with Cursor & Kite API

Leverage AI and automation to give retail investors a significant edge in today's markets. This step-by-step guide shows how to build an advanced portfolio management system using Cursor IDE and the recently released Kite MCP API from Zerodha, enabling algorithmic trading strategies, real-time analytics, and automated risk management without extensive technical expertise.

Read More →

TruthScan: Cutting Through the Noise in a World of Digital Warfare

In today's information battlefield, a tweet can cause more damage than a missile. TruthScan is an open-source OSINT tool designed to verify high-stakes international claims without the bureaucratic red tape or paywall barriers of traditional intelligence platforms. Discover how this democratized intelligence tool cuts through misinformation using satellite imagery, flight data, and social media analysis.

Read More →

From MVP to Enterprise SaaS: Building a Security-First Pipeline

Journey through transforming a basic scheduling application into a robust, SOC 2 compliant SaaS platform. Learn how to implement a comprehensive security-first continuous testing pipeline that scales from MVP to enterprise-ready solution.

Read More →

The Illusion of Encryption

Many users assume that using encryption guarantees privacy, but this is often an illusion. In India especially, even the strongest encryption protocols can't shield users from metadata surveillance, device spyware, and intrusive legal mandates. True privacy demands more than scrambling message content – it requires minimizing metadata leaks, securing endpoints, and sometimes obfuscating traffic patterns.

Read More →

Obfuscation vs Censorship

In India's evolving internet landscape, the state's censorship apparatus is growing in sophistication – from old-school DNS blocks to modern SNI-based filtering and deep packet inspection (DPI). But so too are the tools of resistance. Explore how internet censorship is implemented in India and how obfuscation technologies like obfs4, Shadowsocks, and V2Ray act as countermeasures.

Read More →