mh_ | 5 months ago | on: It's our birthday – so we built everyone this retro game
mh_'s comments
mh_ | 5 months ago | on: It's our birthday – so we built everyone this retro game
(Complete all levels, and we will send you a special 10-year edition t-shirt)
mh_ | 2 years ago | on: Be careful of the examples you use. They stick
mh_ | 3 years ago | on: Canary Tokens
mh_ | 3 years ago | on: Apples AT&T demo was a good example of pg's “relentlessly resourceful”
mh_ | 4 years ago | on: Ask HN: Can we ban Twitter links, please?
https://sensepost.com/blog/2009/twitter-killed-the-infosec-b...
-snip- There’s something liberating about saying “here’s a link”, as opposed to taking the time to formulate your thoughts into a full blown posting.
We were curious if this twitter-effect was real, imaginary or only applicable to lazy people like us.. Thanks to python-twitter and a few lines of script we can look at the the blogging habits of some info-sec superstars (and maybe confuse correlation and causation to jump to conclusions while we at it). -snip-
mh_ | 4 years ago | on: Ask HN: Will referral codes cheapen honest referrals?
I kinda default to “don’t mess with it” but sometimes wish we could do more to say thanks.
mh_ | 4 years ago | on: Good attacks make good detections make good attacks (a MySQL booby-trap)
mh_ | 5 years ago | on: We bootstrapped to $11M in ARR
For infosec for example, i think if your product did "X amazing thing", then you'd definitely get a seasoned experts attention if you tweeted "hey, we built a thing that does X amazing thing, give me 5 minutes and i'll show it to you"
I think theres a part of this that means your products has to convince them in the 5 minutes they give you (or at least has to convince them to give you 5 minutes more)
mh_ | 5 years ago | on: We bootstrapped to $11M in ARR
i.e. if you dont have the voice in the industry that people will listen to, find people who do, and get them to see your product. Most industry leaders are constantly looking to up their game, so you should be able to catch their eye, and if your product is awesome, they will say so
mh_ | 5 years ago | on: We bootstrapped to $11M in ARR
It's worth noting that we couldn't always do this (starting off we just went with "decent salaries and smart ppl to work with").
We try to keep doing this right so that we all do well as the company does.
mh_ | 5 years ago | on: We bootstrapped to $11M in ARR
I have lots of thoughts on this though. I think with a low enough burn rate, you can overcome this with a great product, and taking just one bite at a time. ie. one happy customer, then another. Actual customer happiness is so low, that you just have to do a little better to have people talk about you, and over time it compounds nicely.
mh_ | 5 years ago | on: NSA Owns Everything (2015)
mh_ | 5 years ago | on: NSA Owns Everything (2015)
The article then goes on to explain why, even with hundreds of thousands of ppl doing incident response investigations, nobody caught / correctly attributed these attacks.
mh_ | 5 years ago | on: NSA Owns Everything (2015)
mh_ | 5 years ago | on: Port knocking
mh_ | 6 years ago | on: Ask HN: Can you source this pg quote?
mh_ | 8 years ago | on: Show HN: URL Canary – Get an alert when someone finds your secrets
If you check out https://canarytokens.org you will notice the ability to create several others (be notified when someone resolves an IP address, be notified when someone opens a file, be notified when someone views a QR code, etc)
mh_ | 8 years ago | on: Show HN: URL Canary – Get an alert when someone finds your secrets
mh_ | 11 years ago | on: Uber Database Breach Exposed Information of 50,000 Drivers, Company Confirms
This problem might just be a little more complex than we are giving credit for..
It supports normal(ish) pacman-like activity, except some of the dots you consume might be canaries, which will slow you down/likely lead to you being detected/caught.