mau.fyiUsing Proton Mail as Email Server in Bluesky PDSThis week, Bluesky launched its early access federation for self-hosters. It lets you set up a Personal Data Server to host your data. Setting up a PDS is super easy. You need to follow the steps documented in their bluesky-social/pds repo. The email...Feb 25, 2024·1 min read
mau.fyiThreat Modeling: An Essential Practice for Secure Software DevelopmentIn software development, understanding the nuances of threat modeling is no longer an optional skill but a fundamental necessity for crafting secure applications. This domain underscores the urgency for developers to adopt a proactive stance toward i...Feb 2, 2024·4 min read
mau.fyiUnderstanding Pseudo-Random Numbers vs. Cryptographically Secure Pseudo-Random NumbersIn computing and cybersecurity, the distinction between pseudo-random numbers and cryptographically secure pseudo-random numbers is critical yet often overlooked. This article aims to clarify these concepts, illustrating their importance and applicat...Feb 1, 2024·3 min read
mau.fyiCryptographic Functions: A Key Decision in Software Security StrategySoftware developers are presented with a plethora of cryptographic functions, each designed to serve distinct purposes. From ensuring the confidentiality of data through encryption algorithms like AES (Advanced Encryption Standard) to ensuring data i...Feb 1, 2024·2 min read
mau.fyiWrite-up: TryHackMe's Mr. Robot CTFThis is a write-up for the TryHackMe's Mr. Robot room. Reconnaissance Happy Path Going through an application as a user, in the way it was intended and designed, is generally known as happy path. As I inspected the application, this is what I got. Wh...Aug 13, 2020·11 min read