lowstack.tegar.orgDefault-Allow vs Default-DenyWhen implementing role-based access in an application, we often face a fundamental choice: should access be denied by default or allowed by default? In practice, this means deciding whether every capability starts as false or true. There is no single...Jan 30·4 min read
lowstack.tegar.orgWhen Users Don’t Tell the Whole Story : The XY ProblemThe XY problem is a communication issue that often arises in software development. It occurs when someone seeking help focuses on their attempted solution (Y) rather than the actual problem (X) they’re trying to solve. It often plays out like this: ...Oct 14, 2025·3 min read
lowstack.tegar.orgCombining AES and RSA for Secure Key ManagementEncryption is the foundation of secure communication and data storage. At its core, it scrambles information with a cryptographic key so that only authorized parties can read it. Decryption then reverses this process, restoring the original data. But...Aug 29, 2025·3 min read
lowstack.tegar.orgReducing Site Property Bloat with JSONManaging configuration values in OutSystems can quickly lead to a bloated and messy list of Site Properties,one for every feature toggle, API key, timeout value, and more. While functional, this approach becomes increasingly difficult to scale, navig...Jul 26, 2025·4 min read
lowstack.tegar.orgClearing the Clutter: Tackling Unused Dependencies in OutSystemsWhile migrating one of our UI components, I discovered a dependency on an outdated version within one of our modules. This realization highlighted an important aspect of software development: unused dependencies, or "dead code." Why Handling Unused D...Dec 20, 2024·2 min read