Frank HasanabadNon optimal UI/UXSometimes non optimal UI/UX can cause lost productivity across teams and large organizations. A simple example is Hashicorp’s UI for…Jul 27, 2018Jul 27, 2018
Frank HasanabadEncryption SeriesSmall series of encryption musings as I explore different topics and learn…Mar 18, 2018Mar 18, 2018
Frank HasanabadPerfect SecurityCan perfect security be achieved practically where unlimited computing power can never break your security and your encryption can be…Mar 18, 2018Mar 18, 2018
Frank HasanabadRubber hose attackThe rubber hose attack is extracting secrets from people by use of torture or coercion. Other means is governmental and corporate influence…Mar 18, 2018Mar 18, 2018
Frank HasanabadSecret leakage through URLsWhenever you make a HTTPS connection it’s common stack overflow knowledge that the query string is protected through HTTPS, but it can and…Mar 18, 2018Mar 18, 2018
Frank HasanabadConfused DeputyThe confused deputy problem is a form of security privilege escalation that can be encountered in various forms when implementing security…Mar 18, 2018Mar 18, 2018
Frank HasanabadTurtle shells all the way downSecurity most of the times resembles turtle shells all the way down. You never seem to be able to stop creating the keys, secrets, rotating…Mar 17, 2018Mar 17, 2018