<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security on almost done</title><link>https://nietaki.com/tags/security/</link><description>Recent content in Security on almost done</description><generator>Hugo -- gohugo.io</generator><language>en</language><managingEditor>hello@nietaki.com (nietaki)</managingEditor><webMaster>hello@nietaki.com (nietaki)</webMaster><lastBuildDate>Sun, 01 Sep 2019 15:21:00 +0000</lastBuildDate><atom:link href="https://nietaki.com/tags/security/index.xml" rel="self" type="application/rss+xml"/><item><title>Trust issues: trouble in package paradise - Code BEAM STO 2019 talk</title><link>https://nietaki.com/2019/09/01/trust-issues-code-beam-sto-talk/</link><pubDate>Sun, 01 Sep 2019 15:21:00 +0000</pubDate><author>hello@nietaki.com (nietaki)</author><guid>https://nietaki.com/2019/09/01/trust-issues-code-beam-sto-talk/</guid><description>&lt;p&gt;Earlier this year I gave a talk at &lt;a href="https://codesync.global/conferences/code-beam-sto-2019/" target="_blank" rel="noreferrer"&gt;Code BEAM STO&lt;/a&gt; about a proposed solution to the ever more real risk of hidden malicious code in our library dependencies. You can watch the whole thing here:&lt;/p&gt;
&lt;iframe width="640" height="360" src="//www.youtube.com/embed/ejAY6yWXZSc" frameborder="0" allowfullscreen&gt; &lt;/iframe&gt;
&lt;p&gt;UPDATE: I have since dropped active development of the Hoplon project, but I hope something like it will become reality when the tech community is ready for it :)&lt;/p&gt;</description></item><item><title>I'm stealing API keys from your site</title><link>https://nietaki.com/2018/12/02/i-am-stealing-api-keys-from-your-site/</link><pubDate>Sun, 02 Dec 2018 18:00:00 +0000</pubDate><author>hello@nietaki.com (nietaki)</author><guid>https://nietaki.com/2018/12/02/i-am-stealing-api-keys-from-your-site/</guid><description>&lt;p&gt;Earlier this year I presented my latest project - Hoplon - at the London
Elixir meetup. I&amp;rsquo;m thinking of putting some more work into it over Christmas,
so I figured I might gather the materials about it in one place:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://github.com/nietaki/hoplon" target="_blank" rel="noreferrer"&gt;Hoplon&lt;/a&gt; is an Elixir developer tool that helps
you validate your dependencies contain no
hidden malicious code. Motivated by horror stories from the JavaScript community
such as &lt;a href="https://hackernoon.com/im-harvesting-credit-card-numbers-and-passwords-from-your-site-here-s-how-9a8cb347c5b5" target="_blank" rel="noreferrer"&gt;this hypothetical one&lt;/a&gt;
and &lt;a href="https://github.com/dominictarr/event-stream/issues/116" target="_blank" rel="noreferrer"&gt;this very real one&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>laptop monitoring - the aftermath</title><link>https://nietaki.com/2011/10/04/laptop-monitoring-the-aftermath/</link><pubDate>Tue, 04 Oct 2011 12:00:00 +0000</pubDate><author>hello@nietaki.com (nietaki)</author><guid>https://nietaki.com/2011/10/04/laptop-monitoring-the-aftermath/</guid><description>&lt;p&gt;Some time ago &lt;a href="https://nietaki.com/2011/04/24/defensive-photobooth/" &gt;I described&lt;/a&gt; a script you could use to see who’s using your laptop when you’re not around. I sadly (?) didn’t catch any robbers using it, but the whole setup already took nearly 4000 photos, some of which might be a little interesting:&lt;/p&gt;


 
 
 
 
 
 
 
 
 
 
 &lt;div class="width-patch"&gt;&lt;/div&gt;
&lt;div id="gallery-584c1928aae5056de960eb6a6c3116d5" class="gallery"&gt;
 
 &lt;img src="https://nietaki.com/img/photobooth/photos/ss2011_04_14-10_13_37.jpg" class="grid-w33" /&gt;
 &lt;img src="https://nietaki.com/img/photobooth/photos/ss2011_04_14-12_38_21.jpg" class="grid-w33" /&gt;
 &lt;img src="https://nietaki.com/img/photobooth/photos/ss2011_05_17-15_17_40.jpg" class="grid-w33" /&gt;
 &lt;img src="https://nietaki.com/img/photobooth/photos/ss2011_08_02-11_57_07.jpg" class="grid-w33" /&gt;
 &lt;img src="https://nietaki.com/img/photobooth/photos/ss2011_08_02-11_58_41.jpg" class="grid-w33" /&gt;
 &lt;img src="https://nietaki.com/img/photobooth/photos/ss2011_08_02-12_31_30.jpg" class="grid-w33" /&gt;
 &lt;img src="https://nietaki.com/img/photobooth/photos/ss2011_08_04-12_49_09.jpg" class="grid-w33" /&gt;
 &lt;img src="https://nietaki.com/img/photobooth/photos/ss2011_08_04-12_52_16.jpg" class="grid-w33" /&gt;
 &lt;img src="https://nietaki.com/img/photobooth/photos/ss2011_08_04-21_29_49.jpg" class="grid-w33" /&gt;
 &lt;img src="https://nietaki.com/img/photobooth/photos/ss2011_08_11-10_16_46.jpg" class="grid-w33" /&gt;
 &lt;img src="https://nietaki.com/img/photobooth/photos/ss2011_08_11-10_55_37.jpg" class="grid-w33" /&gt;
&lt;/div&gt;

&lt;p&gt;I’ve got a series or two of one person sitting in front of the computer for quite some time and I could use it to create a timelapse similar to those I made using my &lt;a href="http://www.youtube.com/watch?v=AlOeIpLpXkE" target="_blank" rel="noreferrer"&gt;crude blackberry app&lt;/a&gt;, but on the other hand maybe I shouldn’t be picking on my friends…&lt;/p&gt;</description></item><item><title>defensive photobooth a.k.a Do Not Fuck With a Hacker's Machine</title><link>https://nietaki.com/2011/04/24/defensive-photobooth/</link><pubDate>Sun, 24 Apr 2011 12:00:00 +0000</pubDate><author>hello@nietaki.com (nietaki)</author><guid>https://nietaki.com/2011/04/24/defensive-photobooth/</guid><description>&lt;p&gt;Some time ago, inspired by…&lt;/p&gt;
&lt;iframe width="640" height="360" src="//www.youtube.com/embed/Jwpg-AwJ0Jc" frameborder="0" allowfullscreen&gt; &lt;/iframe&gt;
&lt;p&gt;…also known as the “Do not fuck with a hacker’s machine” clip, and the fact I started using Debian exclusively on my netbook, I decided to make preparations in advance for a dire situation in which my laptop is stolen/captured by insurgents, and retrieve it easier or even play a prank on them. These were my postulates:&lt;/p&gt;</description></item></channel></rss>