No E-Mail is trustworthy
No E-Mail is trustworthy I have worked in IT for 20+ years. I’ve set up and managed SMTP infrastructure on the public internet. Let me share my amazing knowledge with you! Episode 5.
Have you ever heard someone complain about e-mail not being encrypted and “insecure”? How often do you encrypt an e-mail though, if ever? And, if it’s so insecure, where is your security compromised? Who are these people that are apparently reading all your unencrypted e-mail?
Deprogramming Yourself from Smartphone Dependency
Deprogramming Yourself from Smartphone Dependency I have worked in IT for 20+ years. I’ve grown up without smartphones, and have since built mobile applications for the web, iOS, Android, Windows Phone, and Blackberry. Let me share my amazing knowledge with you! Episode 4.
If you believe the smartphone was the greatest invention of the modern age (before AI was invented, obviously), and the idea of not using or owning a smartphone, sounds to you as unrealistic as it sounds comically misguided, or your smartphone is your only internet-enabled computing device, then you can skip this post.
Your Phone (Number) is not your Friend
Your Phone (Number) is not your Friend I have worked in IT for 20+ years. I have messed with telcom systems before the iPhone was invented. Let me share my amazing knowledge with you! Episode 3.
No. This is not a post about super-hackers from China hacking into your smartphone. This is about phone calls, SMS, and just your plain old phone number.
Do you remember the last time you relocated to another region of your country, or simply got a new cellphone contract? Do you remember being able to transfer your phone number to the new region, or contract? Do you remember that the order for your home phone connection or SIM card, and the order to transfer the number, were 2 distinct requests?
Cloud is not cheap
Cloud is not cheap I have worked in IT for 20+ years. I have deployed web-scale applications on the cloud. Let me share my amazing knowledge with you! Episode 2.
The cloud is not cheap. It is powerful.
There’s a reason that we started calling the actual cloud “hyperscalers”. Once people started thinking that they could just run their “OwnCloud” on a RaspberryPi, it had to be made clear that cloud computing is not about just putting your tiny workload on a remote VM.
S3 is public
S3 is public I have worked in IT for 20+ years. I have deployed web-scale applications on the cloud. Let me share my amazing knowledge with you! Episode 1.
The name of your AWS S3 Bucket is a globally unique identifier that everybody can address.
If someone can guess the name of your bucket, they can address it. If AWS responds with “Permission denied” for an S3 Bucket request, it already confirms access policies to be in effect on a bucket with that name. If the name is not in use, AWS S3 responds with a clear “NoSuchBucket” error. Once external actors identify your bucket name to exist, it goes on a watch list of all S3 Bucket names known to be valid targets. Misconfigure your access policies only briefly, and someone might already have been waiting for it.
Yarn 3 Monorepo Project Template
yarn3-monorepo Project Template I’ve taken the learnings from the previously created project templates and merged them into a monorepo.
Check it out: https://github.com/oliversalzburg/yarn3-monorepo
Key Features The project repository and dependencies are to be managed with modern Yarn (Berry/v2/v3).
Kitten Scientists 2.0 Auto-Build
Kitten Scientists 2.0 Auto-Build The 2.0 rewrite of Kitten Scientists now has development builds created on each push and produces an installable userscript for direction consumption.
Yarn 3 Hugo Project Template
yarn3-hugo Project Template I’ve added a new project template to quickly set up a Hugo-based website, like this blog.
Check it out: https://github.com/oliversalzburg/yarn3-hugo
Key Features The project repository and dependencies are to be managed with modern Yarn (Berry/v2/v3).