Brett Lamy
blamy.dev
Brett Lamy
@blamy.dev
Typescript and web
@colinhacks.com can you cut a release on deno.land
latest release is 3.25
deno.land/x/zod@v3.25
August 27, 2025 at 6:02 PM
Raise your hand if you would trade bank accounts with a former macromedia employee.
August 3, 2025 at 6:44 PM
You’re absolutely right! That is annoying I will try to not use this in my future responses.
July 29, 2025 at 4:22 PM
What about the anti JavaScript typescript club.
July 13, 2025 at 7:02 PM
What if they were called collections and they were public and everyone could see your collections.

- Bsky product manager probably.
June 8, 2025 at 7:16 PM
Tesla stock is too high should be $4.20 a share.
June 6, 2025 at 9:08 AM
Are you saying that these pigs are in a blanket?
May 15, 2025 at 10:59 PM
rsc is the hand basket that sends your components to hell
May 5, 2025 at 3:42 AM
<marquee> comes before anything else. We can support <b> tags in q4
May 4, 2025 at 12:06 AM
I also got a failing grade on this project because “my code wasn’t clear enough”

github.com/BLamy/ISTE-3...
ISTE-341-Project1/index.php at master · BLamy/ISTE-341-Project1
Begin to build basic E-Commerce Site. Contribute to BLamy/ISTE-341-Project1 development by creating an account on GitHub.
github.com
May 2, 2025 at 11:11 PM
I remember there was a beautiful period of time where electron had nodeIntegration on by default in the render process no preload script and I went wild with impossible components.

Then the haters (security team) got to me.

github.com/DiamondEleme...
DiamondElements
DiamondElements has 5 repositories available. Follow their code on GitHub.
github.com
May 2, 2025 at 11:10 PM
Inside every senior engineer there is one wolf.
April 21, 2025 at 3:12 PM
But then you will miss bangers like this.

bsky.app/profile/thel...
April 20, 2025 at 1:56 AM
Could I use the same passkey to be both sent to the server for login and also use it to derive my client side encryption key?

Or does that mean my server would be able to decrypt the data making it no longer zero knowledge.
April 19, 2025 at 8:41 PM
That’s fair. This was mostly just a POC but will definitely look into secure recovery options if I run with this idea further.

Right now the goal is to present it to the user as a 2 factor auth step so the user experience is the same.

The fact that I’m encrypting their data is abstracted away.
April 19, 2025 at 8:35 PM
The argument being that if users loose their passkey they lose access to their encrypted data?

Or is this approach some how insecure?
April 19, 2025 at 8:27 PM
Apple keychain and other password managers will sync your passkeys so you can easily encrypt your data on any of your devices.
April 19, 2025 at 11:26 AM