
#19: Mind Your Dependencies
Managing dependencies can be one of the most difficult tasks when working on a project at scale. It’s crucial to understand your dependency graph and how it affects other parts of the firmware. An...
Managing dependencies can be one of the most difficult tasks when working on a project at scale. It’s crucial to understand your dependency graph and how it affects other parts of the firmware. An...
The cert pinning saga continues. Previously on this blog, I wrote about TLS Certs and talked about how you must be careful to mind the expiration dates. From that post: Keep a close eye on cert...
In this post we will cover how to use your authentication key for SSH. Why So you need to use SSH for Github access or log into that jump box for work. Maybe you just want to SSH from your main m...
Recently someone reached out to me with the following problem: I am trying to add udp support to my project, and I’m getting ESP_ERR_NO_MEM for the first time (from esp wifi init). I am using m...
In this post we will cover how to sign your Git commits using the keys we generated previously. Why Sign Your Commits? It’s a little extra work and adds a small amount of size to each commit. So ...
Welcome back to the OpenPGP Series. Here’s what we’ve done so far: Part 1: Introduction Part 2: Create Your Primary Key Part 3: Create Your Subkeys Part 4: Backup Your Keys At this poin...
In this post we’re going to backup the keys we created in the previous posts. After generating your Primary Key and subkeys, they reside on the machine used to create them. In our case that’s just ...
In this post we’re going to create our subkeys which will be our daily workhorses for accomplishing security-related tasks such as signing, encrypting, and authenticating to other services. If you ...
In this post we’re going to create a Primary Key which will be the root of all our keys. It will be the source of trust and how we generate all other keys needed. I am not, and do not claim to ...
This series is the direct result of a very simple question. “How do I do secure backups on Linux?”. There are dozens, if not hundreds, of options to do backups but the part that kicked off this jou...