slexaxton | 11 years ago | on: Shirt.codes: Get a T-shirt of your favorite code snippet
slexaxton's comments
slexaxton | 12 years ago | on: Npm Raises $2.6M Seed Round
The cynicism in this thread is so bizarre to me. No one is being evil. There's no secret foul play. Everyone go write modules and share them and be happy.
slexaxton | 12 years ago | on: Npm Raises $2.6M Seed Round
You can still use the nodejitsu registry for free if you'd like[1]. They arent likely to need as much scaling anymore, but there's still a big cost to running those servers. I don't think there was any foul play when it comes to the scalenpm money as I'm fairly sure they were not aware of the intent for Npm, Inc to take over default hosting.
tl;dr the money did not go to the same people, and the people who crowd funded thought they'd still be hosting npm going forward at the time.
[1] http://blog.nodejitsu.com/simple-hosted-private-npm-and-regi...
slexaxton | 12 years ago | on: Payments Startup Stripe (YC S10) Joins the Billion Dollar Club
I appreciate your interest in the security of Stripe, I think we definitely share the same goals here (making everything as secure as possible). However, I think there's some misunderstanding in some posts (and in the blog post):
> [...] the Stripe.js code is instantiated within the user browser by an HTTP response from the server infrastructure owned by the merchant When Stripe.js is included within the user's browser by a (mandated https, not http) request, it comes directly from Stripe's servers, not from "the server infrastructure owned by the merchant."
Stripe.js isn't served from the merchant. It comes directly from Stripe. Stripe.js helps keep payment card data away from a merchants own servers.
Keeping card data away from someone's machines doesn't mean that they don't need to comply with the Payment Card Industry Data Security Standards, but it does make things quite a bit simpler.
In most cases it means that they're eligible for one of the light-weight self-assessment questionnaires.
PCI compliance, of course, shouldn't be where people stop thinking about security though. You're absolutely right that if the pointer on the merchant's site is changed to a malicious site, that's where the payment data will go. The merchant needs to keep that pointer safe in the same way that if you're redirecting to a hosted payment form or elsewhere, you need to make sure that isn't tampered with either. (A hosted form has the advantage that at least a customer can view the SSL cert but if they don't recognize the domain (or if the domain is obscure anyway), that's not much good.)
Being compliant with the PCI standards is important but it doesn't cover all of the very, very important points of web security.
We do take security very seriously, and if you happen to find a valid security issue with our service, we pay bounties[1] for properly disclosed vulnerabilities.
If you have any other questions, or would like to wax poetic about security or PCI please don't hesitate to send the security team an email at [email protected] or to email me personally at [email protected].
slexaxton | 12 years ago | on: Payments Startup Stripe (YC S10) Joins the Billion Dollar Club
slexaxton | 12 years ago | on: The Productivity Cycle
slexaxton | 12 years ago | on: The Productivity Cycle
> Even if it were true, it would be against our interest to say that we're an overpaid, entitled class.
Not everything that's true or right has to be in our interest.
slexaxton | 12 years ago | on: Open-Sourcing Stripe Shop
slexaxton | 12 years ago | on: Open-Sourcing Stripe Shop
slexaxton | 12 years ago | on: Open-Sourcing Stripe Shop
We have a mostly per-project set of code style and tooling guidelines. Most (if not all) of our larger projects are coffeescript and commonjs based. That's mostly because they all share at least some code. As long as a project is internally consistent and the team agrees with each other, we don't force any specific styles or tools (within reason). We have expertise with the tools we use the most though, so a lot of times the best fit is our own tools.
However, the comparison is a little bit apples and oranges. The JavaScript is optimized for reading, and maximum coherence by outside developers (an example), and the other is a compiled application for execution. The actual _source_ of the checkout project (which is not open-sourced) internally is broken up into neat files and uses modules, etc. It's quite readable for those working on the code, and the output there is generated by a computer and not really intended for humans.
Hope that helps give some insight into our process and reasoning.
slexaxton | 13 years ago | on: Charm shutting down because of unfixable kernel panics with Rails on Ubuntu
slexaxton | 13 years ago | on: Payment iframe - the easiest way to insert Stripe into your website
slexaxton | 13 years ago | on: JQuery 2.0 Drops Support for IE6/7/8; API-Compatible with jQuery 1.9.
slexaxton | 14 years ago | on: Best Practices Exist For A Reason
slexaxton | 14 years ago | on: 5 Things They Told You Not To Use In JavaScript
slexaxton | 14 years ago | on: 5 Things They Told You Not To Use In JavaScript
> My two cents: be careful not to use ASI as if it gave JS significant newlines.
slexaxton | 14 years ago | on: 5 Things They Told You Not To Use In JavaScript
EDIT: I went ahead and JSPerf'd it, and it is 13x slower to run the example in the article.
A lot of times this doesn't matter, but it's not nothing.
Edit 2: Also people avoid using `with` so their minification tools have a better chance. Another thing that can be overcome, but just pointing out that it's not religious dogma that makes people avoid `with`.
slexaxton | 14 years ago | on: Zepto goes semicolon-free
slexaxton | 14 years ago | on: Zepto goes semicolon-free
slexaxton | 14 years ago | on: Zepto goes semicolon-free