Posts

  • Signing Git commits with SSH Certificates

    Many organisations are able to generate short-lived certificates. Git 2.34.0 released in November 2021 added support for signing commits with SSH Keys. Let’s see how to use these to introduce commit signing without GPG and with little additional overhead.

  • Reversing Sound Blaster X7 Control for fun and Linux support

    My personal setup uses a single DAC to handle Bluetooth, USB and optical inputs. Unfortunately, controlling the DAC through Bluetooth is only supported on mobile. Let’s fix that.

  • Log Pattern Recognition: Drain

    This is my second article about Log Pattern Recognition. In this series, we explore different approaches to automated pattern recognition.

  • Log Pattern Recognition: LogMine

    When retrieving logs from an application, you are often looking for outliers (such as a unique error) or what pattern occurs the most. However, defining patterns manually is time-consuming and requires rigour across projects. In this series of blog posts, we are going to explore automated Log Pattern Recognition.

  • DSA-2020-209: Dell XPS 13 9370 Improper Exception Handling vulnerability

    In August 2019, I’ve discovered a bug in how the XPS Bios handles a bootable device. This bug allows an attacker with write permission to a bootable device or physical access to the computer to prevent it from booting.

  • AudioContext Fingerprinting

    An introduction to AudioContext, and how to protect your browser from being fingerprinted by using the AudioContext Scrambler add-on.

  • CNAME Uncloaking using dnscrypt-proxy

    Advertisers are starting to encourage users to use CNAME to masquerade third-party trackers as first-party. Browser extensions do not get access to the DNS answer and are therefore unable to correctly block these trackers. It makes sense to find another way to block these trackers.

  • Getting back some privacy when using DNS

    An introduction to DNS, DNSCrypt and DNS Over HTTPS. The purpose of this article is not to explain in depth how DNS works, if you want to learn more about DNS, please check the references given in the article. I am only showing an application of what you can do with dnscrypt-proxy.

subscribe via RSS