Using TPM-backed Client Certificates in Chrome on Linux
Private keys don’t belong in files on disk. turn your TPM into a client authentication token for the browser.
Private keys don’t belong in files on disk. turn your TPM into a client authentication token for the browser.
Understanding how accumulated technical debt can lead to severe security vulnerabilities.
How a clever use of C lambdas can force the stack to be executable, and why that’s a security risk.
How a seemingly innocent debug function can leak memory, crash programs, or enable arbitrary code execution.
Why insecure enterprise devices are becoming an existential business risk
Learning about buffer overflows, why they persist, and what they reveal about software security.
A personal war story about a compromised production server that captured my password and taught me never to use production hosts for private tasks.
A cautionary tale about a temporary solution that became permanent.