Going Bark: A Furry’s Guide to End-to-End Encryption
Explaining how to encrypt and decrypt data between users, assuming you have a key. Next, how to build an authenticated key exchange and a ratcheting protocol to determine the keys used in the first step. Afterwards, exploreing techniques for binding authentication keys to identities and managing trust.
Implementing Curve25519/X25519: A Tutorial on Elliptic Curve Cryptography
This tutorial bridges the gap between the mathematics and implementation of elliptic curve cryptography. It is written for readers
who are new to cryptography, and it assumes no more mathematical background than most undergraduate computer science courses.
Starting from first principles, this document shows how to derive every line of code in an implementation of the X25519 Diffie-Hellman
key agreement scheme, based on the Curve25519 elliptic curve. The implementation is fast and secure; in particular, it is constant-time
to prevent side-channel attacks.
How do Spotify Codes work?
If you are curious about how bar code, QR code work you will like this article. It shows how Spotify designed their code and how to process an image to decode its data
Building for reliability at HelloSign
After a couple months of dealing with the fallout, our engineering team took a step back to look holistically at why some unexpected behaviors were happening. We traced the overwhelming majority back to the application’s core. To fix this, we decided to bucket code into three tiers dubbed the error kernel, core features, and extended features.
An Introduction to ZFS A Place to Start
ZFS has become increasingly popular in recent years. ZFS on Linux (ZoL) has pushed the envelope and exposed many newcomers to the ZFS fold. iXsystems has adopted the newer codebase, now called OpenZFS, into its codebase for TrueNAS CORE. The purpose of this article is to help those of you who have heard about ZFS but have not yet had the opportunity to research it.
psql command line tutorial and cheat sheet
This is both a brief tutorial and a quick reference for the absolute least you need to know about psql. I assume you’re familiar with the command line and have a rough idea about what database administration tasks, but aren’t familiar with how to use psql to do the basics.
Forbidden Commands to Speed Up macOS
If you take speed and convenience over security any day! Let us march on boldly 😃! The steps listed below will give you a short description of each protection we disable, and the necessary command in Terminal.
Building Your Color Palette
If you are not a designer and work on front-end for your side project, knowing about building a color paletter is super userful
Code to read
a tool to output images as RGB ANSI graphics on the terminal
Ping, but with a graph
A JSON parser, tokenizer, traverser, and printer. It differs from the built-in JSON object is that it’s more fine-grained analysis of JSON structures.
A more helpful way to view differences between complex data structures in RSpec.
a pure Go library that provides utilities for loading, compiling, and debugging eBPF programs. It has minimal external dependencies and is intended to be used in long running processes
k0s - Zero Friction Kubernetes
k0s is an all-inclusive Kubernetes distribution with all the required bells and whistles preconfigured to make building a Kubernetes clusters a matter of just copying an executable to every host and running it.
Open source platform for X.509 certificate based service authentication and fine grained access control in dynamic infrastructures
a tool for automatically testing kubernetes network policies. Simply execute illuminatio clean run and illuminatio will scan your kubernetes cluster for network policies, build test cases accordingly and execute them to determine if the policies are in effect.
serves a fully RESTful API from any existing PostgreSQL database. It provides a cleaner, more standards-compliant, faster API than you are likely to write from scratch
Maddy Mail Server implements all functionality required to run a e-mail server. It can send messages via SMTP (works as MTA), accept messages via SMTP (works as MX) and store messages while providing access to them via IMAP. In addition to that it implements auxiliary protocols that are mandatory to keep email reasonably secure (DKIM, SPF, DMARC, DANE, MTA-STS).
That's it for this round, have a great day! If you like this newsletter, please tell the world, or
tweet about this