Archive by Author

TPP IP Chapter Primer

Characterizations of the intellectual property chapter of the TPP ranges from “SOPA on steroids” to “DMCA++“.  As someone who is building a SOPA resistant JS app, I needed to know the details.  After reading it, I can see why everyone is so confused: it’s almost as difficult to parse as a patent application.  So I treated it like a patent application and rewrote it. (more…)

Continue Reading →
Aside

Warrant Canary #1

Running infrastructure and doing security research makes you paranoid: when you know something that could cause millions or billions of dollars in damages, it’s inevitable that you go a little nuts with the tin-foil.  However, I’ve been toying with some ideas and I think it’s time for me to suit up with some aluminum foil plating and start post warrant canaries. (more…)

Interarchy: A Love Letter

I’ve always thought of Interarchy as the hacker’s FTP client. It has serious street cred, it’s written in Haskell and it started out life as the “Anarchie” FTP client.  However, after becoming a core-contributor to Namecoin, I find myself stopping short of endorsing it as the hacker’s FTP client of choice: Interarchy is not open source. (more…)

Continue Reading →

Escaping Callback Hell

JavaScript’s nested callback style is often derided for being unmaintainable due to callback hell. I’ve been to callback hell and back only to find callback hell is just a local nick-name for a well-known circle of programmer hell, one that has little to do with JavaScript’s callbacks. (more…)

Continue Reading →

Spooky Trolls

A lot of the objections I hear about Snowden’s disclosures regarding the NSA center around “Who get’s to decide what to make public?” Well, it certainly shouldn’t be any of the top NSA leadership, the White House, or the Congressional committees who “oversee” the NSA.  Whatever wrongs Snowden is guilty of, they pale in comparison to the trampling of our rights to free speech, privacy, and freedom from unfounded persecution. He deserves the medal of freedom. It doesn’t surprise me

Continue Reading →

coop.js

Speech.is fundamentally relies on creating a seamless user experience, they cannot know that the website they are visiting is actually tucked away within an iFrame.  The problem with this is that browser vendors do not want users to have their browsing sessions hijacked by websites masquerading as other websites.  Thus communication between parent windows and their child frames are carefully prescribed around what is known as the same-origin policy.  The same origin policy prohibits communication between website addresses of different

Continue Reading →

Last Mile

The “last mile” is always the most difficult for me:  dotting my i’s and crossing my t’s has never been a strength of mine, literally and figuratively.  However, ease of administration and security are both crucial for adoptions by others and I must get both straightened out before the soft launch of Speech.is. Earlier this week I spent my time breaking down the install of Speech.js into manageable parts and putting polish on the install process.  I pulled the finished,

Continue Reading →

Counterfeit-Proof Physical Bitcoins

The problem with current “physical” Bitcoins systems is that their production cost scales at upfrontCost + btcValue x rawMaterialsCost x coins while the attack cost is only upfrontCost + rawMaterialsCost x coins.  Storing a physical one-way hash of the individual coins on Namecoin would make such coins “counterfeit-proof” in that the attack cost scales at some multiple of the reproduction cost of the physical one-way hash.  This is a major breakthrough for both Bitcoin and traditional currencies. (more…)

Continue Reading →