Akshat Joshi

Threat modeling disposable browser environments

Introduction Web browsers have evolved into powerful execution environments, routinely handling authentication tokens, privileged credentials, internal dashboards, and sensitive user data. Yet, most security controls still treat browsers as long-lived, trusted endpoints. Disposable

Multiverse , everyday

Theory : After we sleep, we wake up in a new alternative universe. It looks and feels similar but somethings have changed.

512-Byte Boot Sector Pong Game

written by - Akshat Joshi Sometime back, I set myself a crazy constraint: Load only one thing at boot - A Pong game that fits in one floppy disk sector — 512 bytes. Why