TL;DR summary of stories on the internet
In the technical post “Lessons Learned: Sharding for startups,” the author dives into the concept of database scalability through parallel databases known as “sharding.” The term “sharding” was inspired by early online games like Friendster and Flickr, where multiple copies of a game world were referred to as “shards.” This innovative approach to database partitioning […]
Read more »
The author shares a story about how a seemingly essential calculator on the pricing page actually confused potential users, resulting in them overestimating costs and being less likely to sign up. After a series of frantic attempts to fix the calculator, they decided to remove it altogether in an A/B test. Surprisingly, the results showed […]
Are you ready to tackle network defense? Focus on the big picture by visualizing your assets as a graph of interconnections rather than a simple list. Attackers exploit these relationships to navigate your network, hopping from one compromised system to the next. Manage your graph by pruning unwanted edges, reducing admin privileges, implementing credential silos, […]
The author shares how they created a tool called Unfollow Everything to remove the addictive News Feed on Facebook. Despite its popularity and positive impact on users, Facebook sent a cease-and-desist letter demanding the tool be taken down. The author, facing legal threats, had to comply, highlighting Facebook’s anti-competitive behavior. The tool’s removal is detrimental […]
When designing secure protocols, remember this: if you perform a cryptographic operation before verifying the MAC on a message, trouble will follow. The Vaudenay Attack is a prime example of this. The optimal way is to follow the “encrypt-then-authenticate” method. The SSH plaintext recovery attack is another clever demonstration of the doom principle, highlighting the […]
If you’re having trouble accessing a website and are being prompted to verify that you’re not a robot, make sure your browser supports JavaScript and cookies. This could be due to unusual activity detected from your computer network. For more information, review the Terms of Service and Cookie Policy. If you need assistance, contact the […]
The author defines wardriving as the search for WiFi networks, Bluetooth devices, and GSM towers from a variety of vehicles or even walking. They have been analyzing wireless networks since the early 2000s and recently obtained the Offensive Security Wireless Professional certification in 2022. The author showcases various devices used for wardriving and RF audits […]
Over 500 psychologists, psychiatrists, and therapists share their experiences with ProPublica about joining health insurance networks to help those unable to afford treatment. However, insurers have been caught shortchanging customers with mental illness, restricting coverage and denying treatment because these patients are considered bad for business. Insurers often decide who can receive treatment, what kind, […]
Rnote is an open-source vector-based drawing app perfect for sketching, handwritten notes, and annotating documents or pictures. This app, designed for students, teachers, and drawing tablet owners, offers features like Pdf and picture import/export, an infinite canvas, and an adaptive UI for various screen sizes. Written in Rust and GTK4, Rnote boasts an Adaptive UI […]
Preliminary results from a study at two Helsinki daycare centres show that using air purifiers led to a significant reduction in illnesses and absences among children and staff. Different sizes and types of air purifiers were tested, with promising results showing a 30 percent decrease in sickness. The study also aims to determine if air […]