<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>pop-pay</title><description>Runtime security for AI agent commerce. Threat models, red team findings, methodology.</description><link>https://pop-pay.ai/</link><language>en-us</language><item><title>Threat model: agent commerce</title><link>https://pop-pay.ai/blog/agent-commerce-threat-model/</link><guid isPermaLink="true">https://pop-pay.ai/blog/agent-commerce-threat-model/</guid><description>Threat actors, security primitives, and STRIDE coverage for the agentic-commerce layer pop-pay defends.</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate></item><item><title>Red-team methodology (overview)</title><link>https://pop-pay.ai/blog/red-team-methodology-explained/</link><guid isPermaLink="true">https://pop-pay.ai/blog/red-team-methodology-explained/</guid><description>How pop-pay is tested under adversarial pressure: the corpus framework, scoring semantics, and reproducible harness.</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate></item><item><title>Vault cryptography</title><link>https://pop-pay.ai/blog/vault-cryptography/</link><guid isPermaLink="true">https://pop-pay.ai/blog/vault-cryptography/</guid><description>AES-256-GCM at rest, scrypt with compiled-salt hardening, downgrade defense, and the active-attack matrix for the credential vault.</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate></item></channel></rss>