mh_'s comments

mh_ | 4 years ago | on: Ask HN: Can we ban Twitter links, please?

I wrote this about 13 years ago (a little tongue in cheek) but it held up:

https://sensepost.com/blog/2009/twitter-killed-the-infosec-b...

-snip- There’s something liberating about saying “here’s a link”, as opposed to taking the time to formulate your thoughts into a full blown posting.

We were curious if this twitter-effect was real, imaginary or only applicable to lazy people like us.. Thanks to python-twitter and a few lines of script we can look at the the blogging habits of some info-sec superstars (and maybe confuse correlation and causation to jump to conclusions while we at it). -snip-

mh_ | 4 years ago | on: Good attacks make good detections make good attacks (a MySQL booby-trap)

You can wave the encoding away (with a tick-box) but in general, people over-estimate what attackers will "notice". In cases like this, many are as desperate to get the loot as users are when they get phished. dialogue boxes and browser warning fade into the background as they hit "accept" to move closer to their goal.

mh_ | 5 years ago | on: We bootstrapped to $11M in ARR

I think it would depend on how those experts roll.

For infosec for example, i think if your product did "X amazing thing", then you'd definitely get a seasoned experts attention if you tweeted "hey, we built a thing that does X amazing thing, give me 5 minutes and i'll show it to you"

I think theres a part of this that means your products has to convince them in the 5 minutes they give you (or at least has to convince them to give you 5 minutes more)

mh_ | 5 years ago | on: We bootstrapped to $11M in ARR

I've previously pondered how we would have approached our early steps if we were completely unknown, and the best option i can think of is a kind of sincere, influencer marketing approach.

i.e. if you dont have the voice in the industry that people will listen to, find people who do, and get them to see your product. Most industry leaders are constantly looking to up their game, so you should be able to catch their eye, and if your product is awesome, they will say so

mh_ | 5 years ago | on: We bootstrapped to $11M in ARR

We do average to above average salaries, and all share a profit share bonus at the end of the year. Everyone gets a company credit card to buy books/tech needed to do their jobs. Everyone gets side benefits like an audible subscription, other mini stipends.

It's worth noting that we couldn't always do this (starting off we just went with "decent salaries and smart ppl to work with").

We try to keep doing this right so that we all do well as the company does.

mh_ | 5 years ago | on: We bootstrapped to $11M in ARR

We were a little bit lucky in this regard, because we had some authority in the niche (2 members of our original team had spoken at security conferences internationally for the previous 10 years).

I have lots of thoughts on this though. I think with a low enough burn rate, you can overcome this with a great product, and taking just one bite at a time. ie. one happy customer, then another. Actual customer happiness is so low, that you just have to do a little better to have people talk about you, and over time it compounds nicely.

mh_ | 5 years ago | on: NSA Owns Everything (2015)

What they (we) are talking about, is that nobody caught the attacks.

The article then goes on to explain why, even with hundreds of thousands of ppl doing incident response investigations, nobody caught / correctly attributed these attacks.

mh_ | 5 years ago | on: Port knocking

To defend Canarytokens here (and I’m totally biased because we make it) some tokens can’t be easily avoided. Ie. If the token is a Slack/AWS/something API key, then the only way for the attacker to profit is to use it, and the moment they do, they tip their hand. The joy of Canarytokens is not having to set up infrastructure to get the alerting win, with very little effort.

mh_ | 6 years ago | on: Ask HN: Can you source this pg quote?

Thanks! I'm guessing it must have been in the talk given at Google (that the essay is based on) that appears to no longer live on the internet.
page 1