Hi everyone, Welcome to issue #178. Let’s go straight to our links this week.
Explaining how to encrypt and decrypt data between users, assuming you have a key. Next, how to build an authenticated key exchange and a ratcheting protocol to determine the keys used in the first step. Afterwards, exploreing techniques for binding authentication keys to identities and managing trust.
This tutorial bridges the gap between the mathematics and implementation of elliptic curve cryptography. It is written for readers who are new to cryptography, and it assumes no more mathematical background than most undergraduate computer science courses. Starting from first principles, this document shows how to derive every line of code in an implementation of the X25519 Diffie-Hellman key agreement scheme, based on the Curve25519 elliptic curve. The implementation is fast and secure; in particular, it is constant-time to prevent side-channel attacks.
If you are curious about how bar code, QR code work you will like this article. It shows how Spotify designed their code and how to process an image to decode its data
FDWs in essence, allows to access foreign data sources inside Postgres(PG) via a set of wrapper APIs. They are usually written in C obviously to interact with Postgres APIs. If you want to use Go, what are the steps we need?
After a couple months of dealing with the fallout, our engineering team took a step back to look holistically at why some unexpected behaviors were happening. We traced the overwhelming majority back to the application’s core. To fix this, we decided to bucket code into three tiers dubbed the error kernel, core features, and extended features.
We need to find the right balance between resilience and innovation. Both can be contradictory: to be resilient, we must test everything, which consumes time that we don’t spend innovating. A good trade-off is to test in production.
ZFS has become increasingly popular in recent years. ZFS on Linux (ZoL) has pushed the envelope and exposed many newcomers to the ZFS fold. iXsystems has adopted the newer codebase, now called OpenZFS, into its codebase for TrueNAS CORE. The purpose of this article is to help those of you who have heard about ZFS but have not yet had the opportunity to research it.
This is both a brief tutorial and a quick reference for the absolute least you need to know about psql. I assume you’re familiar with the command line and have a rough idea about what database administration tasks, but aren’t familiar with how to use psql to do the basics.
If you take speed and convenience over security any day! Let us march on boldly 😃! The steps listed below will give you a short description of each protection we disable, and the necessary command in Terminal.
If you are not a designer and work on front-end for your side project, knowing about building a color paletter is super userful
A JSON parser, tokenizer, traverser, and printer. It differs from the built-in JSON object is that it’s more fine-grained analysis of JSON structures.
JavaScripta pure Go library that provides utilities for loading, compiling, and debugging eBPF programs. It has minimal external dependencies and is intended to be used in long running processes
GoBy AWS VP Cloud Architecture Strategy. Read the write up too
k0s is an all-inclusive Kubernetes distribution with all the required bells and whistles preconfigured to make building a Kubernetes clusters a matter of just copying an executable to every host and running it.
Open source platform for X.509 certificate based service authentication and fine grained access control in dynamic infrastructures
a tool for automatically testing kubernetes network policies. Simply execute illuminatio clean run and illuminatio will scan your kubernetes cluster for network policies, build test cases accordingly and execute them to determine if the policies are in effect.
serves a fully RESTful API from any existing PostgreSQL database. It provides a cleaner, more standards-compliant, faster API than you are likely to write from scratch
Maddy Mail Server implements all functionality required to run a e-mail server. It can send messages via SMTP (works as MTA), accept messages via SMTP (works as MX) and store messages while providing access to them via IMAP. In addition to that it implements auxiliary protocols that are mandatory to keep email reasonably secure (DKIM, SPF, DMARC, DANE, MTA-STS).
BetterDev Link
Every Monday