Latest posts     🔎 Search:

You Should Use Hashtags

I put hashtags in my posts. You should, too. Not to boost social media engagement (gross), but rather to empower readers to curate their timelines.

Any Updates?”

Open-source projects are developed in plain sight — the current status is almost always fully visible to everyone. Which is why posting comments like “Any updates?” is just about the least helpful comment anyone can make.

Fortressa — The App Store for Open Source

Fortressa is the app store for open source, providing you with open-source SaaS alternatives to take back control over your data and reduce your software costs.

Introduction to Long-Term Investing

How to invest for long-term wealth building, financial freedom, and security in retirement.

Homebrew Python Is Not For You

Don’t use Homebrew Python. It’s not meant for you.

The High Cost of the Early Adopter Tax

Being an early adopter of technology has significant costs that may not be worth paying.

U2F Hardware Security Keys

Universal 2nd Factor (U2F) hardware security keys and multi-factor authentication (MFA) combine to provide strong security and good usability — the best of both worlds.

Multi-Factor Authentication, Phones, and SMS

Most implementations of multi-factor authentication (MFA), also known as two-factor authentication (2FA), rely on sending codes via SMS text messages or phone calls. There are serious problems with this approach.

Don’t Make Your Own Two-Factor Authentication App

Multi-factor authentication can be poorly implemented in a multitude of ways, and one of those ways is to ship a custom branded authentication app.

Multi-Factor Authentication Best Practices

Two-factor authentication (2FA), also known as multi-factor authentication (MFA), comes in many flavors. But not all are created equal. Best practices should involve at least two selections from this list: FIDO U2F hardware keys, one-time passwords (OTP), and recovery codes.

Tacklebox for Fish Shell

Tacklebox is a framework for organizing and sharing Fish shell functions, plugins, modules, and themes.

Articles from sites I follow

Show passwords as they're typed in Terminal

After I posted my funny story of how I recovered the password of an encrypted Mac disk image, I received …

via The Desolation of Blog 17 April 2024

Python Project-Local Virtualenv Management Redux

One of my first TIL entries was about how you can imitate Node’s node_modules semantics in Python on UNIX-like …

via Hynek Schlawack 02 April 2024

All My Thoughts After 40 Hours in the Vision Pro

Welcome to the 2030s. The post All My Thoughts After 40 Hours in the Vision Pro appeared first on Wait …

via Wait But Why 09 February 2024