silenteh | 5 years ago | on: ZFS: Use mirror vdevs, not RAIDZ
silenteh's comments
silenteh | 9 years ago | on: Ask HN: Who wants to be hired? (September 2016)
Freelancer with more than 15 years of experience.
Recent work:
- Developed a Java service which saves 50% of costs to an Amazon EC2 customer: Java + Netty
- Developed a advertising server which handles over 50 billion impressions per month: Java + Netty
- Developed a statistics collector which records over 50 billion impressions per month: Scala + Netty + Akka + HDFS
- Writing Golang code for over two years
- DevOps role: created several continuous integration and deployment pipelines.
- Over 10 years of Linux administration
- Several blockchain projects
Email in the profile.
Sebastian
silenteh | 9 years ago | on: Ask HN: Freelancer? Seeking freelancer? (September 2016)
Freelancer with more than 15 years of experience.
Recent work:
- Developed a Java service which saves 50% of costs to an Amazon EC2 customer: Java + Netty
- Developed a advertising server which handles over 50 billion impressions per month: Java + Netty
- Developed a statistics collector which records over 50 billion impressions per month: Scala + Netty + Akka + HDFS
- Writing Golang code for over two years
- DevOps role: created several continuous integration and deployment pipelines.
- Over 10 years of Linux management
I prefer long term projects.
Email in the profile.
Sebastian
silenteh | 10 years ago | on: Handbook of Applied Cryptography (2001)
silenteh | 10 years ago | on: Cisco buffer overflow vulnerability with remote code execution
There is also a Snort signature to detect attempts to exploit this vulnerability.
silenteh | 11 years ago | on: Microsoft Research JavaScript Cryptography Library
silenteh | 11 years ago | on: Call me maybe: Elasticsearch
silenteh | 11 years ago | on: Call me maybe: Elasticsearch
This brought me to dig deeper into Elasticsearch code, find out more about its code quality, deal with machine endiannes, deal with byte shifting, think how to structure code in Golang and overall enjoy the feeling of touching the bare metal again...
silenteh | 11 years ago | on: Call me maybe: Elasticsearch
This allows to execute operations on a specific shard of a specific index on a specific node of the cluster resulting in better performance than going through the HTTP interface.
It can be used to efficiently store big quantities of data, for instance logs, which then can be visualized with Kibana.
It's just unfortunate that Elasticsearch presents the problems mentioned in the article and which I also experience in production, because it has a series of plugins which makes it a good solution for specific use cases.
silenteh | 11 years ago | on: Call me maybe: Elasticsearch
I tried to use the Elasticsearch thrift plugin but unfortunately it does not work for the version 1.1 and 1.2
So basically I have to inspect each and every byte of each and every request and response in order to be able to send or parse data.
While developing the client a managed several time to crash the Elasticsearch server by sending malformed packets. In addition, this, brought me to review the networking part of Elasticsearch code and I think it needs a refactoring and a better, deeper and cleaner usage of Netty.
I hope they will soon sort out this and the problems mentioned in the article, since I think that Elasticsearch is really an amazing product!
silenteh | 12 years ago | on: Ask HN: Who wants to be hired? (June 2014)
Stack: Golang, Scala, Java, Netty, Akka, Cassandra, ElasticSearch, Redis, Reactive
Resume: https://github.com/silenteh/cv/blob/master/silenteh_resume.p...
Contact: [email protected]
Looking for a company where code simplicity and performance matter! I do not like to waste CPUs cycles, memory and I/O in general.
I have more than 13 years experience as a developer and I have been designing and implementing scalable, distributed and resilient systems and software, to handle over 40 million unique users per month, for the last 7 years. I am proficient with Scala, Java, Netty and Akka and I really enjoy coding in Golang. I have a strong passion for cryptography and IT security in general. On my free time, I am working on a Golang Elasticsearch client which uses the tcp transport. I am an open minded, friendly and business driven person who loves technology. So for any questions drop me an email !
silenteh | 12 years ago | on: Ask HN: Who wants to be hired?
Stack: Golang, Scala/Java, Akka, Netty, C, ElasticSearch, NoSQL (Cassandra, MongoDb)
Contact: my HN username at gmail
Resume: please contact me for a copy
In the field for more than 14 years.
I am passionate about cryptography and IT security and I am looking for an opportunity to work on open source projects preferably in crypto and security in general. I have also more than 5 years of experience in scaling web sites and native applications stack with more than 50 billion page views per month. I love talking to others, so for any question feel free to ping me anytime!
Latest books read or in the process of reading:
- High Performance Browser Networking
- Understanding and using C pointers
- Reverse Engineering
silenteh | 12 years ago | on: Ask HN: What encryption algorithms should we take as compromised?
Sure, however this process creates alternatives and if the crypto community thinks the winner is backdoored I am pretty sure we will know it and additionally we will have a valid alternative ready to be implemented. Additionally if the NSA/NIST modifies the specs for the crypto construction there is still the possibility to implement the original one. See SHA-3 for instance. It was about to be weakened, but the crypto community could still implement the original spec.
> That would include AES and SHA-3.
You cut the rest of the sentence and therefore changed completely the whole meaning. My original sentence included: "...without going through years of reviews by international cryptographers." Take a look at this video of D.J.B.: https://www.youtube.com/watch?v=G-TM9ubxKIg He makes a great example with the Dual_EC_DRBG, where many cryptographers told NIST that there could be a backdoor. NIST answer basically was: sorry too late, it has already been implemented !
So in other words, in case of Dual_EC_DRBG the standardization process was all in reverse. First NIST standardized it and then the crypto community started to review it and found problems.
silenteh | 12 years ago | on: Ask HN: What encryption algorithms should we take as compromised?
You should avoid at all costs anything that has been standardized by NIST without going through years of reviews by international cryptographers. Dual_EC_DRBG is a clear example of crypto construction which falls into this category.
This is my general rule of thumb.
However knowing which ciphers one should use is not enough! You absolutely need to know HOW to use them. A basic and superficial example is AES in ECB mode, which is semantically secure as long as you use a key to encrypt one and only one single block. Another one is, for example, after how many encrypted blocks a key should be rotated, based on the underlying cipher used.
Once you have learnt how to use the basic building blocks of crypto you are then NOT supposed to write your own implementation and instead use existing ones....there is a small problem with this....they are broken or they either not implement all the necessary crypto constructions you need. OpenSSL is an example of broken crypto implementation, and instead NaCl does not have TLS implemented.
So this is a short summary and my personal opinion of why crypto is hard. On top of all this there are not enough experts out there which have the time to review crypto implementations or new and old constructions, and we are living a historical period where we desperately need crypto to protect our privacy.
So my final suggestions is to take some of your spare time and go through Dan Boneh Crypto 1 at Coursera: https://www.coursera.org/course/crypto
It is worth every single minute.
Once you have done that, I would also suggest you to take the Matasano Crypto challenges: http://www.matasano.com/articles/crypto-challenges/
Finally I want to thank everybody who have taken their time to create and maintain both Crypto 1 course and the Matasano challenges.
silenteh | 12 years ago | on: Apple Dev Center outage
silenteh | 12 years ago | on: Elon Musk to publish hyperloop design by August
This is another example of what pg meant with his last essay.
silenteh | 12 years ago | on: Ask HN: What's the weirdest iOS 7 icon?
Unless I am on the first page of the phone, where I normally keep all Apple native apps, it seems to me I have still the old iOS version.
It will probably take some time before I get used to it.
silenteh | 12 years ago | on: iOS 7
silenteh | 12 years ago | on: Larry Page addresses PRISM
silenteh | 13 years ago | on: Larry Page addresses PRISM