"The right tool for the job"
I’ve been thinking a lot about engineering values and principles lately, and one that keeps popping up is “use the right tool for the job”. I don’t think it’s a very good principle.
Read more →
I’ve been thinking a lot about engineering values and principles lately, and one that keeps popping up is “use the right tool for the job”. I don’t think it’s a very good principle.
Read more →Today, GitHub published a write-up on a number of CVEs1 in the npm packages tar and @npmcli/arborist. In their own words,
In 1984 the co-inventor of Unix, Ken Thompson, delivered a seminal speech in which he highlighted that you can’t trust code that you did not totally create yourself 1. For a while, this lesson was largely ignored as open-source package registries like RubyGems, PyPI and npm grew rapidly. However, as we’re seeing more and more supply-chain attacks through software dependencies, the risks of using unvetted dependencies are becoming clearer.
Read more →Routing attacks on Tor occur when an adversary attempts to influence the route a Tor circuit takes in order to improve their chances of intercepting traffic. In January of this year, I wrote a literature review on this topic that I’m sharing here: PDF link.
Read more →Telegram defaults to unencrypted chats, so your messages are stored in plaintext on their servers. If you don’t want them to read your messages, you have to manually enable Secret Chats — but these don’t work for groups and require users to be online at the same time. A 2017 usability study found that many users thought they were using secure, encrypted chats when they were in fact sending all their messages in plaintext.
Read more →