mbag | 4 years ago | on: Hubris – A small operating system for deeply-embedded computer systems
mbag's comments
mbag | 4 years ago | on: For programmers, remote working is becoming the norm
mbag | 5 years ago | on: Beej's Guide to Network Programming (1994-2020)
mbag | 5 years ago | on: Dependency Confusion: How I Hacked Into Apple, Microsoft and Other Companies
>It just pollutes PyPi and a nuisance to others. I agree, but so are the packages that are no longer maintained. You also reserve pakcage name if you decide to opensource it. Furthermore, by creating package you are leaking metadata about your organization, i.e. some functionality can be inferred from package names.
And sure you can train and try to enforce security awareness, but your people need to be right 100% of the time, while attackers need them to make only one mistake. Similar with namesquatting of the popular packages.
https://pip.pypa.io/en/stable/reference/pip_install/#finding...
mbag | 5 years ago | on: Dependency Confusion: How I Hacked Into Apple, Microsoft and Other Companies
[1] https://github.com/pan-net-security/artifactory-pypi-scanner
mbag | 5 years ago | on: SolarWinds leaked FTP credentials through a public GitHub repo since 2018
You can also run your own instance: https://github.com/eth0izzle/shhgit/
mbag | 5 years ago | on: SolarWinds leaked FTP credentials through a public GitHub repo since 2018
Another option is to use pipeline to perform those checks. Sure, by the time pipeline runs, the secrets are already in the repository, but at least you caught them early. However, in this case you should definitively do secrets replacement.
mbag | 6 years ago | on: HashiCorp Raises $175M at $5.1B Valuation
I know about Helm chart for Vault (btw also created and maintained by Hashicorp). It's quite handy for quick deployments, but getting it to production will require changes, as most security things are disabled. All Helm chart does, it gets Vault up and running, unsealing has to be done either manually or via third party (cool thing, if your use-case allows storing such secret on third party HW). Not to mention, that if you want to use Consul as storage backend, you will have to deal with that using separate chart.
Without knowledge what Ansible playbook does, it's hard to compare the two. If ansible is configuring host OS from scratch (updates/tools installation etc) then yes, it might take much longer, then deploying to fully managed K8s cluster.
mbag | 6 years ago | on: HashiCorp Raises $175M at $5.1B Valuation
mbag | 6 years ago | on: Thieves are targeting beehives with growing sophistication
Do you by any chance know of anyone doing something similar to this article [1] It's noted as WIP, but I didn't manage to find any follow up papers, or some open source projects doing something similar. apic.ai looks similar but I don't think it's using lasers to remove mites from them.
[1] https://www.researchgate.net/publication/313808393_Basic_alg...
mbag | 6 years ago | on: Samsung accidentally sends 'Find My Mobile' notifications to Galaxy phones
Since so many people received notification, it could be that some "Samsung God mode" exists.
mbag | 6 years ago | on: Show HN: Acmedns Authenticator Plugin for Certbot
For more on ACME DNS server the source repo can be found here [1]. The link you pasted to wiki seems to be a kubenetes how-to guide. I'll add direct link to ACME DNS repo to README as well.
mbag | 8 years ago | on: How to Study Mathematics (2017)
And for example, a real revelation with regard to infinity came, when I read (or heard somewhere, it was long time ago) that infinity can sometimes be few millimeters or even micrometers. Up until then I always imagined some really large number, but at that point I realized, you need to put problem before you need to put problem before you into perspective.
mbag | 8 years ago | on: How to Study Mathematics (2017)
mbag | 8 years ago | on: Cancer ‘vaccine’ eliminates tumors in mice
mbag | 8 years ago | on: Turning vim into an IDE through vim plugins
When learning Vim it's not wise to learn about everything at once. start slow at first, lear a few commands, then when you find you are doing something many times, try to find way to optimize it. Try not to use mouse for highlighting, use different visual modes instead (visual line, visual block are great).
Here is article be the Vim author which can give you some hints on how to edit files: http://moolenaar.net/habits.html
And as he mentions there, it can be applied to making your editing more efficient with other editors as well, so it's not a waste of time :)
mbag | 8 years ago | on: Seven habits of effective text editing (2000)
mbag | 8 years ago | on: Seven habits of effective text editing (2000)
Another useful visual mode is Visual Block (<ctrl>+v), for deleting/yanking, replacing block across multiple lines.
mbag | 8 years ago | on: A Berlin Borough Buying Out Private Landlords
mbag | 9 years ago | on: The thriving black market of John Deere tractor hacking
But someone from Oxide would need to tell you exactly how many RFDs took to desing and implement Hubris.
[1] https://oxide.computer/blog/rfd-1-requests-for-discussion