silenteh's comments

silenteh | 9 years ago | on: Ask HN: Who wants to be hired? (September 2016)

Zurich Switzerland - REMOTE

Freelancer with more than 15 years of experience.

Recent work:

- Developed a Java service which saves 50% of costs to an Amazon EC2 customer: Java + Netty

- Developed a advertising server which handles over 50 billion impressions per month: Java + Netty

- Developed a statistics collector which records over 50 billion impressions per month: Scala + Netty + Akka + HDFS

- Writing Golang code for over two years

- DevOps role: created several continuous integration and deployment pipelines.

- Over 10 years of Linux administration

- Several blockchain projects

Email in the profile.

Sebastian

silenteh | 9 years ago | on: Ask HN: Freelancer? Seeking freelancer? (September 2016)

SEEKING WORK - Zurich Switzerland - REMOTE

Freelancer with more than 15 years of experience.

Recent work:

- Developed a Java service which saves 50% of costs to an Amazon EC2 customer: Java + Netty

- Developed a advertising server which handles over 50 billion impressions per month: Java + Netty

- Developed a statistics collector which records over 50 billion impressions per month: Scala + Netty + Akka + HDFS

- Writing Golang code for over two years

- DevOps role: created several continuous integration and deployment pipelines.

- Over 10 years of Linux management

I prefer long term projects.

Email in the profile.

Sebastian

silenteh | 11 years ago | on: Call me maybe: Elasticsearch

You are right, I should have probably mentioned I am doing it on my free time and no one is paying me. It's just pure curiosity. :)

silenteh | 11 years ago | on: Call me maybe: Elasticsearch

Why would I not ?

This brought me to dig deeper into Elasticsearch code, find out more about its code quality, deal with machine endiannes, deal with byte shifting, think how to structure code in Golang and overall enjoy the feeling of touching the bare metal again...

silenteh | 11 years ago | on: Call me maybe: Elasticsearch

The clients actually acts as a cluster node and therefore has knowledge about the cluster state, its indexes and shards, because it receives notifications from it, once it joins.

This allows to execute operations on a specific shard of a specific index on a specific node of the cluster resulting in better performance than going through the HTTP interface.

It can be used to efficiently store big quantities of data, for instance logs, which then can be visualized with Kibana.

It's just unfortunate that Elasticsearch presents the problems mentioned in the article and which I also experience in production, because it has a series of plugins which makes it a good solution for specific use cases.

silenteh | 11 years ago | on: Call me maybe: Elasticsearch

I am currently writing a Golang client for Elasticsearch which uses the native binary protocol and I have to say the lack of documentation about it is making the process really painful!

I tried to use the Elasticsearch thrift plugin but unfortunately it does not work for the version 1.1 and 1.2

So basically I have to inspect each and every byte of each and every request and response in order to be able to send or parse data.

While developing the client a managed several time to crash the Elasticsearch server by sending malformed packets. In addition, this, brought me to review the networking part of Elasticsearch code and I think it needs a refactoring and a better, deeper and cleaner usage of Netty.

I hope they will soon sort out this and the problems mentioned in the article, since I think that Elasticsearch is really an amazing product!

silenteh | 12 years ago | on: Ask HN: Who wants to be hired? (June 2014)

Location: Switzerland - Remote

Stack: Golang, Scala, Java, Netty, Akka, Cassandra, ElasticSearch, Redis, Reactive

Resume: https://github.com/silenteh/cv/blob/master/silenteh_resume.p...

Contact: [email protected]

Looking for a company where code simplicity and performance matter! I do not like to waste CPUs cycles, memory and I/O in general.

I have more than 13 years experience as a developer and I have been designing and implementing scalable, distributed and resilient systems and software, to handle over 40 million unique users per month, for the last 7 years. I am proficient with Scala, Java, Netty and Akka and I really enjoy coding in Golang. I have a strong passion for cryptography and IT security in general. On my free time, I am working on a Golang Elasticsearch client which uses the tcp transport. I am an open minded, friendly and business driven person who loves technology. So for any questions drop me an email !

silenteh | 12 years ago | on: Ask HN: Who wants to be hired?

Switzerland, Remote, Full Time

Stack: Golang, Scala/Java, Akka, Netty, C, ElasticSearch, NoSQL (Cassandra, MongoDb)

Contact: my HN username at gmail

Resume: please contact me for a copy

In the field for more than 14 years.

I am passionate about cryptography and IT security and I am looking for an opportunity to work on open source projects preferably in crypto and security in general. I have also more than 5 years of experience in scaling web sites and native applications stack with more than 50 billion page views per month. I love talking to others, so for any question feel free to ping me anytime!

Latest books read or in the process of reading:

- High Performance Browser Networking

- Understanding and using C pointers

- Reverse Engineering

silenteh | 12 years ago | on: Ask HN: What encryption algorithms should we take as compromised?

> The judges who chose AES and SHA-3 as the "winners" of the global competitions are the NSA.

Sure, however this process creates alternatives and if the crypto community thinks the winner is backdoored I am pretty sure we will know it and additionally we will have a valid alternative ready to be implemented. Additionally if the NSA/NIST modifies the specs for the crypto construction there is still the possibility to implement the original one. See SHA-3 for instance. It was about to be weakened, but the crypto community could still implement the original spec.

> That would include AES and SHA-3.

You cut the rest of the sentence and therefore changed completely the whole meaning. My original sentence included: "...without going through years of reviews by international cryptographers." Take a look at this video of D.J.B.: https://www.youtube.com/watch?v=G-TM9ubxKIg He makes a great example with the Dual_EC_DRBG, where many cryptographers told NIST that there could be a backdoor. NIST answer basically was: sorry too late, it has already been implemented !

So in other words, in case of Dual_EC_DRBG the standardization process was all in reverse. First NIST standardized it and then the crypto community started to review it and found problems.

silenteh | 12 years ago | on: Ask HN: What encryption algorithms should we take as compromised?

In general you should prefer crypto constructions which are a result of global competitions. For example AES and SHA3.

You should avoid at all costs anything that has been standardized by NIST without going through years of reviews by international cryptographers. Dual_EC_DRBG is a clear example of crypto construction which falls into this category.

This is my general rule of thumb.

However knowing which ciphers one should use is not enough! You absolutely need to know HOW to use them. A basic and superficial example is AES in ECB mode, which is semantically secure as long as you use a key to encrypt one and only one single block. Another one is, for example, after how many encrypted blocks a key should be rotated, based on the underlying cipher used.

Once you have learnt how to use the basic building blocks of crypto you are then NOT supposed to write your own implementation and instead use existing ones....there is a small problem with this....they are broken or they either not implement all the necessary crypto constructions you need. OpenSSL is an example of broken crypto implementation, and instead NaCl does not have TLS implemented.

So this is a short summary and my personal opinion of why crypto is hard. On top of all this there are not enough experts out there which have the time to review crypto implementations or new and old constructions, and we are living a historical period where we desperately need crypto to protect our privacy.

So my final suggestions is to take some of your spare time and go through Dan Boneh Crypto 1 at Coursera: https://www.coursera.org/course/crypto

It is worth every single minute.

Once you have done that, I would also suggest you to take the Matasano Crypto challenges: http://www.matasano.com/articles/crypto-challenges/

Finally I want to thank everybody who have taken their time to create and maintain both Crypto 1 course and the Matasano challenges.

silenteh | 12 years ago | on: Apple Dev Center outage

You can make a phone call to Apple and they will extend your account for few days if you will explain the situation.

silenteh | 12 years ago | on: Ask HN: What's the weirdest iOS 7 icon?

All non-Apple icons. It looks really weird to me to have some flat icons and some glossy ones.

Unless I am on the first page of the phone, where I normally keep all Apple native apps, it seems to me I have still the old iOS version.

It will probably take some time before I get used to it.

silenteh | 12 years ago | on: iOS 7

I personally hope the accelerometer-linked 3D will not also help to make flat the battery which already does not last long.

silenteh | 13 years ago | on: Larry Page addresses PRISM

Unless I am mistaken US and most European countries are based on Democracy. Wikipedia defines Democracy as a form of government in which all eligible citizens have an equal say in the decisions that affect their lives. Granted, wikipedia is not the oracle but it gives a good definition in my opinion. Does, the gathering of my personal data, affect my life ? Well in my personal opinion it does, therefore I should be informed about it.
page 1