Really enjoying the “On The Metal” podcast by Oxide Computer. Brings back lots of good memories messing around and breaking computers back in the 90’s.
Wow, some very interesting new research here: https://tpm.fail/
Researchers published attacks that can recover encryption keys from Trusted Computing Modules (TPMs) (which isn't supposed to be possible) by timing elliptic curve signature generation. "On Intel fTPM, our key recovery succeeds after about1,300 observations and in less than two minutes."
Nearly all Windows computers store BitLocker encryption keys in TPMs.
Found myself re-implementing the same CDN setup over and over again for every serverless project I worked on, so I created https://github.com/smoketurner/serverless-cdn as a GitHub template repo for people to start from
We are living in an age where everything from clothing to furniture to technology is cheap and disposable. The assumption is that nothing lasts, so one might as well buy the cheapest thing and throw it away when it inevitably breaks. Nowhere is this more true than the phone market, but it's something we want to change with the Librem 5.
Dropwizard 2.0.0 has been released!
Thanks to the countless contributors who helped bringing this version out of the door!
Release Notes: https://github.com/dropwizard/dropwizard/releases/tag/v2.0.0
Upgrade Notes: https://www.dropwizard.io/en/stable/manual/upgrade-notes/upgrade-notes-2_0_x.html
We are delighted to share that early yesterday we shipped the first #Librem5 Birch devices to backers https://puri.sm/posts/librem-5-birch-shipping-announcement/
Dropwizard 1.3.17 has been released with a few backports from Dropwizard 2.0.x.
Only way to be sure... #privacy
ProtonMail Version 4.0 is now in open beta! The new version totally redesigned, laying the foundation for the future of ProtonMail. Log in to your account at beta.protonmail.com to try it now. https://protonmail.com/blog/v4-beta-announcement/
We've just released Dropwizard 1.3.16 with an update to Jackson 188.8.131.5291020 to address CVE-2019-16942, CVE-2019-16943, and CVE-2019-1753.
Thanks to Mark Symons (https://github.com/msymons)!