Search

Post types:
Categories:
🔖

Using disposable phone numbers for better security

Read Note

Many people use disposable emails to preserve privacy and enhance digital security, so why not do the same with your phone …

🔖

Understand JavaScript closures in minutes

Read Note

I always forget what closures are, even if I continue to use them. The article makes a case for considering closures as stateful functions which is quite neat. Basically, closures allow a …

🔖

The ransomware superhero of Normal, Illinois

Read Note

The story of Michael Gillespie, a brilliant (yet modest) programmer who has become one of the world's leading ransomware crackers. He works for free, sometimes alone and sometimes with others in the …

🔖

That's not how 2FA works

Read Note

A succinct and to-the-point teardown of why 2FA (two-factor authentication) is beneficial for user verification by businesses, but terrible for preventing things like phishing attacks (because the …

📖

Jamstack Conf 2020

Read Article

Notes from the 2020 Jamstack Conf. Some interesting dives in the Jamstack community and various applications of Jamstack technologies, with tweet threads as usual.

🔖

Libre Wolf

Read Note

An open-source fork of the Firefox web browsers, with a strong(er) focus on privacy and security. Basically disables all telemetry and most of the slightly questionable decisions that Mozilla have …

🔖

New success criteria in WCAG 2.2

Read Note

A thorough overview of the new success criteria added (and removed) in WCAG 2.2, including clear guidance on how to test and pass each …

🔖

Why I'm over GraphQL

Read Note

An interesting dive into the long-term complications and issues that Matt has come across whilst using GraphQL. From self-professed "hype train member" for the technology to now considering it a …

Published:
Categories:
  • Nuts & Bolts
Tags: