Jan 10 · 5 min read · به «ایران امن» خوش آمدید. تصور کنید برای درب ورودی منزل خود، کلیدی ساختهاید که هزاران نفر دیگر شبیه آن را دارند یا میتوانند به راحتی حدس بزنند آن را کجا پنهان کردهاید. استفاده از اطلاعات شخصی به عنوان رمز عبور (Password) در دنیای دیجیتال، دقیقاً م...
Join discussion
Aug 21, 2025 · 3 min read · I have been playing around with the https://ergaster.org/posts/2025/07/28-direnv-bitwarden-integration/. It is a necessary read before you read this note since it explains the problem in quite nice details and builds the proposed solution step by ste...
Join discussionMar 18, 2025 · 7 min read · Tras la polémica surgida entorno a la empresa Proton AG, por declaraciones de su CEO y la decisión de cerrar su cuenta corporativa en la red social de Mastodon; han sido bastantes los usuarios en ésta última y otros foros como Reddit o Privacy Guides...
Join discussion
Oct 4, 2024 · 4 min read · There are many ways of handling your AWS Root credentials, but after many years of going back and forth with various vaults and password management systems, I came across a surprisingly simple pattern: Don’t bother remembering those passwords to begi...
Join discussion
Sep 23, 2024 · 3 min read · Introducción (si no te interesa pasa directamente a la reseña) Tras haber publicado la entrada sobre como organizar un respaldo al gestor de contraseñas Bitwarden e ir realizando varias pruebas tanto con otros gestores como con aplicaciones específic...
Join discussion
Sep 23, 2024 · 5 min read · Puede decirse que la idea de esta entrada queda condensada en el título de la misma. Lo único que iremos desgranando, son las distintas situaciones que pretendemos cubrir con los a su vez, diferentes modelos de respaldo. La importancia que -afortunad...
Join discussion
Dec 4, 2023 · 3 min read · Cybersecurity has become very important over the years. More powerful computers force you to have increasingly longer passwords. This post shall give you a rough introduction to how I handle cyber security and the products I am using for it (this is ...
Join discussion
Apr 9, 2023 · 11 min read · Previously on... In the previous blog post in this series, I discuss the evolution of email identities. I state the history of using creative and unique nicknames in the early days of the internet to the increasing need for real names to establish cr...
Join discussion
Apr 2, 2023 · 11 min read · Previously on... As mentioned in the initial article of this series, I've grown increasingly frustrated with phishing emails and fraudulent text messages. My objective is to regain control of my data, and writing these blog posts serves as a commitme...
Join discussion