Hacker Newsnew | past | comments | ask | show | jobs | submit | more viralpoetry's commentslogin

What an ignorant I was. March last year (2019), I wrote an email to Lee Holloway asking him how he could bootstrap such a great company. Now I know why I haven’t received the answer.

EDIT: I found an email:

Dear Lee Holloway,

Excuse my curiosity, as an Engineer I am not writing this kind of emails a lot, but I have read the blog series by John Graham-Cumming about the company, and it would really help me if you can answer my question about the constant flow of engineering innovations from your company.

I am a security engineer from Europe and would like to know how is it possible, that security team will start producing such a stream of innovative things like Keyless SSL, CFSSL, SIDH implementation, Red October key management server and many more your company already published?

When the "lift and shift" from the open source or vendor stops and internal building start to happen within an organization? Is it a cultural thing where only a small startup can succeed and scale later? Is it about the budget or is it a cultural shift that is non forcible upon them? Is a prerequisite to the innovation, that almost everything is developed in house? That came to me as a contra productive strategy. I have read Skunk Works and other books, but I am still impressed how that happens regarding to the modern leading IT/infra companies.

Thank you for your time,

...


I occasionally write about security, mostly about applied cryptography from non-math perspective.

If you are interested on day to day work in financial cryptography and hardware encryption modules, check:

https://www.malgregator.com/post/key-management/

Some predictions on future malware development (some of them confirmed by now):

https://www.malgregator.com/post/the-future-of-malware/the-f...

Or using modern smartcards like Yubikey with DevOps tools (Vault) by leveraging ancient technologies like pkcs11:

https://www.malgregator.com/post/vault-authentication-with-y...


How you ended up implement it in the code? Is it just a heuristic implemented as a series of if/else/case statements? Minimax? Thank you

EDIT: sorry, I found out that source code is available, I will try to find it

EDIT2: Looks like it's up for sale, not open


https://github.com/DigitalMars/Empire-for-PDP-10

It's the same algorithm. Mainly a bunch of ad-hoc heuristics.


I just want to say that ORCA author, Devine Lu Linvega[1], is such a talented and creative person. He build complete ecosystem with it's own language, drag & drop theme support[2] and human readable DB format[3]. He and his girlfriend (cartoonist) Rekka Bell are sailing the ocean and working from their sailboat Pino[4].

[1] https://wiki.xxiivv.com/

[2] https://github.com/hundredrabbits/Themes

[3] https://wiki.xxiivv.com/site/indental.html

[4] https://100r.co/site/about_us.html


Hi, thanks for sharing your website. You are doing interesting research.


hi thank you please fill in contact form and hop into the discord


Worth to mention that Brazil charged Intercept co-founder Glenn Greenwald with cybercrime charges similar to Assange. The guy who first met Snowden in HK with Laura Poitras.

Even if it looks like they have "postponed" prosecution for now.

https://theintercept.com/2020/02/06/glenn-greenwald-intercep...


This is really interesting project. I have closed the webpage at first, because I thought it is closed source, but then found your repository on a github.

I do not want to make some promo for other projects, but how you achieve trust with the signed list of fingerprints, is something similar I have read earlier there: https://tech.firstlook.media/keylist-rfc-explainer

Interesting prioject, will be watching it!


Curious that nobody mentioned https://standardnotes.org/

* already open-source

* client side encryption

* multi platform / multi device

* offline access, local backups


Shameless plug: For anybody interested in the cryptographic key management part there is a post about the hardware, people and processes behind the commercial cryptographic key management https://www.malgregator.com/key-management.html


do not use single node instance, in a HA fashion it is not a problem. Even with the open source version, which we are using.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: