#identity  #encryption   in tech

updated Sat 19 May 2018 by Ken

I first started using @KeybaseIO a few years ago to link together my social accounts. This creates a web of accounts which is dramatically more difficult to impersonate than any single account. So, it's an exercise in impeding identity theft.

A web of accounts could, for example, enable me to trust your email signature when I only know you through Twitter.

The Keybase filesystem is one of the newer tools and has a lot of promise. It is a global namespace with public and private trees. The private tree allows any two parties have a truly confidential exchange of data just by reading and writing in the special folders on their computer. You can look over here for more info about it.

This web page is actually hosted in the kbfs at /keybase/public/kourier. The content is signed during upload and so is verifiable by running the Keybase app on your computer, though it is not obvious in your web browser.

If you install Keybase you'll be able to passively track changes in the web of identity with commands like shell keybase follow kourier


Keybase from u/bingnet

Virtual Machines as Code

Optimizing for determinism in virtual machines. This approach can be used to vend the same virtual machine image version in many formats e.g. VHD for Azure, Stac Programmable Front-end

In short, a programmable cloud delivery network (CDN) aka front-end like is an API by which to configure the logical edge of an application stack.

Securing AWS Credentials

A single rogue npm module, Ruby gem, PyPi module, or ill-fated cURL command could expose you (and your employer) t