mos_6502 | 9 months ago | on: WhatsApp introduces ads in its app
mos_6502's comments
mos_6502 | 10 months ago | on: Ask HN: How do you store private keys?
The gold standard for this would be a Hardware Security Module (HSM), which is essentially a device that stores private keys with certain guarantees of physical security (e.g, that private key material cannot be extracted from the device once it has been generated or placed there, and the device performs operations using the key material on behalf of some client).
HSMs in various forms underpin all sorts of cryptosystems that society depends on, because securing private key material at rest is essential. You'll find them everywhere from your debit/credit card, to certificate authorities, financial institutions, defense, and your smartphone.
For your use case, I'd recommend taking a look at Yubikeys. I did a writeup a while back on how to use them to store different types of private keys for various purposes:
mos_6502 | 11 months ago | on: Self-contained Python scripts with uv
[1] https://bundler.io/guides/bundler_in_a_single_file_ruby_scri...
mos_6502 | 1 year ago | on: Dear Apple: Add "Disappearing Messages" to iMessage
mos_6502 | 1 year ago | on: The most unhinged video wall, made out of Chromebooks
>This means that the slowest computers hold back the fastest computers […]
It works so well because you’ve optimized the system’s design with respect to its bottleneck. Check out the theory of constraints :)
mos_6502 | 1 year ago | on: Google Distributed Cloud air-gapped appliance
It's designed to military standards and to be as individually transportable as other military communications equipment:
> Department of Defense (DoD) Impact Level 5 (IL5) accreditation
> rugged and portable design that meets stringent accreditation requirements like MIL-STD-810H
> The appliance can be conveniently transported in a rugged case
> Weighing approximately 100lbs, it's human-portable, making it easy to transport and deploy in various locations.
> disaster zones, remote research stations, or long-haul trucking operations
Military operations are all three of these.
Its design enables the offline self-hosting of cloud surveillance tools:
> Google Distributed Cloud air-gapped appliance is designed to operate without any connectivity to Google Cloud or the public internet. The appliance remains fully functional in disconnected environments
> built-in AI solutions from the Google Distributed Cloud air-gapped appliance like translation, speech, and optical character recognition
What about facial recognition?
mos_6502 | 1 year ago | on: Show HN: Radius – A Meetup.com alternative
I run a large Meetup group for software developers in the Tampa Bay Area [0]
We’re multi-platform, and essentially a technology vendor for other Meetup groups in Tampa ([1]). While our overall community spans ~4,000 distinct people, only ~2,300 of those are Meetup members [1],[2]
I’ve built a ton of unique integrations around Meetup, and have built a ton of custom integrations with Meetup’s API (such as [3],[4])
If you’d like to get in touch, please do send an email to the address on our GitHub org [5]. Would love to see more competition in this space!
[2] https://go.tampa.dev/meetup
[3] https://github.com/tampadevs/events.api.tampa.dev
mos_6502 | 1 year ago | on: The number of CS grads who don't even know basic Git commands is astounding
mos_6502 | 2 years ago | on: TampaDevs – Tampa Bay's Developer Community
I've been working on Tampa Devs with the other co-founder since September of 2021, along with a group of really excellent volunteers.
We're a nonprofit that's loosely inspired by nyc's Recurse Center (https://www.recurse.com/). We host events, a mentorship program, and career development resources. All of which are free or very low cost.
Our community has grown to include thousands of local developers. It feels good to be part of something that drives a widely positive impact, especially on a local level. Anyone can do something similar no matter where they are, and I would highly recommend it.
For a cool technical angle, here's a talk I gave at a local conference on the tools we use to run our community at scale: https://go.tampa.dev/unityops.
mos_6502 | 2 years ago | on: Giving up the iPad-only travel dream
Like the author, as well as many who have commented, I've long been disappointed in the gap between macOS' support for advanced use cases (which I need), and the iPad's portability (which I like).
I picked up a Surface Go 3. Having an actual desktop OS on a well-built, decently powerful (albeit hot at times) tablet struck the perfect balance for me. Wish I had done it years ago.
mos_6502 | 3 years ago | on: Ask HN: Best way to “donate” dev hours to charity?
mos_6502 | 3 years ago | on: Ask HN: Best way to “donate” dev hours to charity?
mos_6502 | 3 years ago | on: Ask HN: Best way to “donate” dev hours to charity?
My organization is itself a 501c3, and our charitable mission is to provide developers with opportunities to learn and network. We do this by organizing monthly technical meetings, networking events, career panels, and hackathons. All at no cost to our members (no fees, tickets, or dues).
We also provide support to a larger network of meetup groups in the Tampa Bay area [2]. These groups are more specialized into specific disciplines/areas of interest. Many of these died out during the pandemic so rehabilitating that scene is an important mission for us as well.
mos_6502 | 3 years ago | on: GitHub Actions Down / Degraded
mos_6502 | 3 years ago | on: Godot 4.0 Released
After sorting out a couple minor snags in the build process (particularly around getting cross-compilation to work on Linux in GitHub Actions, and library validation entitlements for code signing), the finished builds work wonderfully on the M1 machines we've tested with.
mos_6502 | 3 years ago | on: Sssecrets: Simple Structured Secrets
I’ve just released sssecrets. Sssecrets is a Ruby gem for generating secrets (like API tokens, etc) in line with best practices.
Sssecrets is a reusable implementation of GitHub's API token format (which is also used by NPM), and it's designed to make it simple for developers to issue secure secret tokens that are easy to detect when leaked. Structured Secrets are a compact format with properties that are optimized for detection with static analysis tools. This makes it possible to automatically detect when secrets are leaked in a codebase using features like GitHub Secret Scanning or GitLab Secret Detection.
mos_6502 | 3 years ago | on: Go's crypto/x509 package ignores KeyUsage status flags
From Engineering Security, Peter Gutmann:
A European government CA marked its signing certificates as being valid for encryption only, but no-one noticed.
Another European CA marked its signature keys as not being valid for signatures.
A different CA marked its own trusted root certificate as being invalid for certificate signing.
Another national CA distributed a certificate to be used to encrypt data for the country’s tax authority that was marked as only being usable for digital signatures but not for encryption.
Yet another CA reversed the order of the bit flags in the keyUsage due to confusion over encoding endianness, essentially setting a random keyUsage in certificates that it issued.
Another CA created a self-invalidating certificate by adding a certificate policy statement stipulating that the certificate had to be used strictly as specified in the keyUsage, and a keyUsage containing a flag indicating that the RSA encryption key could only be used for Diffie-Hellman key agreement.
mos_6502 | 3 years ago | on: Cyber Guidance for Small Businesses
Most SMB leaders have enough trouble as it is keeping up with their day to day IT operations. The section at the start of the document is intended for “CEOs”, yet it’s likely impenetrable to that audience on account of the jargon while simultaneously giving advice that’s too high-level/broad to be useful.
Later parts of the document intended for technical leads are too focused on minutiae rather than outlining the overarching goals of their implementation, which loses the intended spirit of the document IMO.
For example, it’s more useful to start by outlining what these controls are trying to achieve. For example, “Ensuring business continuity after a ransomware attack” or “Protecting business assets with strong multi-factor authentication”, as opposed to throwing out specific individual technical controls without a high-level narrative to describe what you’re actually aiming for.
mos_6502 | 3 years ago | on: Show HN: PubKey – Communicate Privately in Anonymous Public Spaces
U2FsdGVkX1/FFKGwfCgflTAvl5rr2RP+WSQ4n/tGHuMcFnD8JFfXJfoAzIHAVakHSOiiM7MnOsAZGT2jyh/+Sgs6mgN4wea6RnMx8dIXCItuu5g462RG9un8fHivYtqdTNBa3XLp8HDWsPXMHoEoiP4M1F9nrQhMREYFp2Q6fpiEpZY4q1a+VtGpLIjdVk2k788eMQjvYZh/vruzvx751HCzz/D+lsVSFJsOaoZQpqOTj4iD/kSludUkKY7v/vk8fcew4i88RtEc63oRgarLiBEu5rB1PGxCf32/8tVVjy4/B2QmQ8nYdL50SR4oeU52lb3pyciOweuJOiE88U+WdmQ4IJ+LNozGYE514vta5Qy2ZCHgHhHNTrs32X6n9+1w0Mv0Y8z/Cxf28Rm356pIPw==
mos_6502 | 3 years ago | on: How can I get my boyfriend to stop digging his tunnel?
https://en.wikipedia.org/w/index.php?title=Hobby_tunneling&s...
Here’s one such example, which is also an interesting technical deep dive: https://signal.org/blog/building-faster-oram/