Pas de Code
76 subscribers
106 photos
1 file
402 links
What I cannot create, I do not understand.

DM: @alexey_mileev
Original channel in RU: @devballet
Twitter: twitter.com/pasdecode_
Download Telegram
Cursorless - tool to edit code with voice. I've posted about it some time ago. This time the creator gave a talk at Strange Loop, there you'll find some basics of this approach. Very strange still, but it's cool that it lives and evolves.

#talk #editor #voice
Intuition for Cryptography. An excellent high-level overview, can help you better understand some core basics.

#cryptography #cybersec
Zuzalu. Sort of a 2 months hackathon with 200 attendees somewhere in Montenegro. This post will uncover more details of how and why they'd organized it and how it's actually been.

#crypto #story #ethereum
Going bananas here. Flappy Bird clone. Runs on macOS Finder. Coded in AppleScript. And Python.

#humor #macos #gamedev
You've most probably heard about a recent high severity vulnerability in curl. Here you'll get the actual details. Such things never get old. Small bug with huge consequences.

#cybersec #vulnerability #curl
Nice! It's been only 5 10 13 years and we're about to get a mature multiplexer in Go!

#go #server #http
For those who prefer to work while listening to some electronic music, old and new. On these two pages (boom and bam) you can dive into various subgenres, check out some samples and discover something new.

#music #sound
An astonishing one-liner: getaddrinfo() from glibc (which is, surprise-surprise, used not only in C and C++) reads environment variables, so pray that no setenv() calls will happen in your multithreaded program.

#unix #gnu #c
A high level overview of what's going on in a fight between governments who want a backdoor to encrypted messages and those who insist on privacy rights.

#cybersec #encryption
Beautiful! Where do you host some malicious code so that it can't be deleted? That's right, on a public blockchain! Anyone can write and read, and there's no way to remove data from it.

#hack #cybersec #crypto
CRDT series continues. There won't be more details on the algorithm itself, but there will be a post on how to build a toy pixel art editor with it and a post with various strange optimizations for the amount of data transferred.

#cs #network #datastructure
Steganography is a method of concealing some information inside some harmless medium - image, audio, text, etc. In this post you'll find both historical intro and many intriguing links to various tools.

#cryptography #cybersec #encryption
An attempt to try Moore's law on zero knowledge proofs. Main idea is that zkp production effectiveness grows too, but it happens in significant discreet jumps. So basically it's better to design your systems in a way that allows to swap proving schemes on the go.

#zk #cryptography #math
This researcher has checked old and new terminal emulators for vulnerabilities, and I must say, their findings make me paranoid as hell. For example, launch some server and stare at its logs, receive some smart request, oopsie, RCE. RCE because of your tty, not because of your server!

#talk #terminal #vulnerability
Have never touched WASM before, but have to since recently. Here you'll find a survey where people (~300 respondents) answer which languages they compile to WASM, why they do that, what they're missing, etc. To be honest, I don't really like all this buzz about the new "write once, run anywhere" format. My current experience shows that it's not all that great. But we'll see. Maybe in 5 years all of us will be compiling into WASM.

#wasm #survey