- Almost every week there is a confirmed breach of losing our personal and private data.
- The average amount of contacts exposed per breach is raising.
(source of the stats)

How can we, standard users, protect ourselves from a breach?
What can we do when we are notified that our data has been exposed?
The harsh reality?
We can only mitigate the effects.
Once the data has been exposed, it will be “out there” and no matter what we will do, there is no solution for us to erase it.

I am not affected, I don’t care. The password…

The following article is not a criticise of the writer nor the BBC nor I wrote this as a starting point for a political debate.
I simply loved how the BBC News Graphic team were and are trying to represent Brexit and the possible futures, especially it is interesting how the view and possibilities have changed within days (or hours).

All the following graphic designs are from different versions of the same article “Brexit: What happens now?” by “Peter Barnes” (Senior elections and political analyst, BBC New)

I have used the web archive to gather the snapshots represented here.


If you are just interested in the graphical representation of the stats, here your summary (base on Friday 15th of April):

Stats and graphical representation of breached data (from HIBP)

If you are interested in more details of the summary or where I got the data from or why I even did it, keep reading.


  • Since July 2013, every month there has been at least one confirmed breach.
  • On average since July 2013 there is almost 1 breach per week.
  • From 2014 until 2017, the average accounts compromised per breach is increasing.
  • The average number of days between breach and added to HIBP has declined to 43 days average…

Having a secure and optimised login process is vital for a business.

This is not just from the end-user perspective, but as well to guarantee credibility and minimise any possible data breach impact (there is a data breach almost every week).

Below, you can find multiple areas, solutions and ideas that will improve security during a login or signup process.


Password-free login solutions

Of course the best protection against a possible data breach with password list is not having any password at all. This can be achieved mainly via the following options:

  • Shared authentication solution (OpenID, OAuth, Social login).
    The end user will use…

For personal reasons I had to revoke my previous keys and generate a new one.

keyID 0x6a3ce17ca150552d
AC7C 1130 3942 10B6 B11E A998 6A3C E17C A150 552D
Old ones have been revoked and new one has been published in the most common PGP Public Key Server:

xkcd — security (link)

A friend of mine has just shared with me the following article: Terry Pratchett’s unfinished novels destroyed by steamroller.
I have been growing up with several books with Terry Pratchett name on their cover.

Clacks relay tower by bartpaaddiator

In tribute to the late Sir Terry Pratchett (12 March 2015), many websites have added the message “GNU Terry Pratchett” into the html header “X-Clacks-Overhead”.

…of course my personal website is doing the same.

If you want to know if a website is sending this message, you can use a browser plugin/extension to display the X-Clacks-Overhead in Clacks Semaphore, and you will see a special icon…

I like going to meetups, it’s the best place to gather feedback, ideas and absorb experiences from other people.

Not long ago I went to an agile meetup and a criticism I was listening to was from someone transitioning from waterfall to agile methodology, he was struggling with the “lack of a strict how-to in agile”.

I have to admit that waterfall is well structured and the rules are clear, explaining exactly which document you need to create, when and how. …

We know that a prioritized backlog helps us understand what to do next but sometimes is difficult to grasp where we are and what we should do next, especially if we just dive in a big project already started with hundreds of stories and/or issues created.

To solve these situations, I have found very useful in managing the roadmap and backlog with the help of a story map.

A user story map arranges user stories into a useful model to help understand the functionality of the system, identify holes and omissions in your backlog, and effectively plan holistic releases that…

Last year I went through an interview process for a Product Manager position and I was requested to create a 2 pages document answering the following question: ”Was Google Glass a good product? Why?” (I had 24–48 hours to write it)

While writing the answer I came up with my personal definition for what makes a product great, be P.U.N.K.

Following my original text:

Was Google Glass a good product? Why?


Google Glass was a great idea, but it was offered to the public too early for its time. It was always stated that it was a work-in-progress product and it clearly was lacking the infrastructure, there…

A couple of days ago I was listening to the latest podcast from Command Line Heroes (presented by Red Hat), with the title “Hello, World” (Season 2, Episode 2).
For people interested in it you can find it here https://www.redhat.com/en/command-line-heroes/season-2/hello-world

This 27m 57s episode dives into the history of programming languages starting from the first compiler invented by “Amazing Grace”.

The whole podcast is worth listening to, but at the end of it there is a recording of Grace Hopper stating a phrase that impacted me:

Just during the next 12 months, any one of you says that we’ve always…

Andrea Gigante

Agile practitioner, security fanatic, coffee addict, sci-fi fan, chess lover, Linux/Android user, Shorinji Kempo enthusiast. https://www.skytale.it

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store