Tile

View full article
Tile
Select a feed to view its content

Loading feed entries...

FastCGI: 30 Years Old and Still the Better Protocol for Reverse Proxies

FastCGI: 30 Years Old and Still the Better Protocol for Reverse Proxies

Why IP Address Certificates Are Dangerous and Usually Unnecessary

Why IP Address Certificates Are Dangerous and Usually Unnecessary

Certificate Authorities Are Once Again Issuing Certificates That Don't Work

Certificate Authorities Are Once Again Issuing Certificates That Don't Work

Google Just Suspended My Company's Google Cloud Account for the Third Time

Google Just Suspended My Company's Google Cloud Account for the Third Time

I'm Independently Verifying Go's Reproducible Builds

I'm Independently Verifying Go's Reproducible Builds

SQLite's Durability Settings are a Mess

SQLite's Durability Settings are a Mess

The Story Behind Last Week's Let's Encrypt Downtime

The Story Behind Last Week's Let's Encrypt Downtime

The Difference Between Root Certificate Authorities, Intermediates, and Resellers

The Difference Between Root Certificate Authorities, Intermediates, and Resellers

The SSL Certificate Issuer Field is a Lie

The SSL Certificate Issuer Field is a Lie

whoarethey: Determine Who Can Log In to an SSH Server

whoarethey: Determine Who Can Log In to an SSH Server

No, Google Did Not Hike the Price of a .dev Domain from $12 to $850

No, Google Did Not Hike the Price of a .dev Domain from $12 to $850

Checking if a Certificate is Revoked: How Hard Can It Be?

Checking if a Certificate is Revoked: How Hard Can It Be?

Parsing a TLS Client Hello with Go's cryptobyte Package

Parsing a TLS Client Hello with Go's cryptobyte Package

How I'm Using SNI Proxying and IPv6 to Share Port 443 Between Webapps

How I'm Using SNI Proxying and IPv6 to Share Port 443 Between Webapps

Comcast Shot Themselves in the Foot with MTA-STS

Comcast Shot Themselves in the Foot with MTA-STS

It's Now Possible To Sign Arbitrary Data With Your SSH Keys

It's Now Possible To Sign Arbitrary Data With Your SSH Keys

How Certificate Transparency Logs Fail and Why It's OK

How Certificate Transparency Logs Fail and Why It's OK

Security Vulnerabilities in Smallstep PKI Software

Security Vulnerabilities in Smallstep PKI Software

The Lengths People Go To Just To Avoid DNSSEC

The Lengths People Go To Just To Avoid DNSSEC

Writing an SNI Proxy in 115 Lines of Go

Writing an SNI Proxy in 115 Lines of Go