security

  • Device Security

    ·

    How much control are we really giving up to anonymous developers with access to an update hook? How secure are our machines?

    Read More

  • Physical Security

    ·

    All of the encryption software in the world is meaningless if you fail to practice a couple of simple habits regarding physical security.

    Read More

  • Remote and Secure

    ·

    A “virtual private network” is a way to keep your data secure, whether your on a dedicated 4G tether or connected to Starbuck’s free wireless. Traffic from your machine is encrypted at the machine, sent to a remote (trusted) server, decrypted, and proxied to the real network target.

    Read More

  • WordPress and Password Hashing

    ·

    WordPress’ password creation/verification system is pluggable (meaning you can replace it with your own implementation). Before you do so, though, you should understand what’s already implemented and why.

    Read More

  • Democratizing SSL Certificates

    ·

    I have an easier time trusting individuals and corporations I personally know than large companies with whom my only relationship is as a certificate vendor. I’m also a huge proponent of democratizing both publishing on the Internet and the Internet itself.

    Read More

  • Proper Code Styling

    ·

    I look at a lot of code. In my job, recreationally on weekends. Everywhere I see people using a specific coding style and, upon pushback, defend it in the sake of brevity. I’m talking about braceless one-line conditionals.

    Read More