RSS.Social

Posts - malgregator

follow: @[email protected]

Posts

My Two Years of AI Experimentation

Making identical U2F hardware security keys

Turning e-paper book reader into digital picture frame

Splitting cryptographic key with openssl and bash

Protecting The Company

Automating Internal Certificate Issuance With ACME-based Certificate Authority

Lessons Learned Using Vault As A Secret Store

Notes On Threat Modeling

Directions Of The Cybersecurity Industry

Waze: How I Tracked Your Mother

Vault Authentication with YubiKey

DevOps: easy answers, hard questions