Tanveer Salim (Fosres)Threat Modeling: A Beginner’s GuideLast article I said the first step to protect users of software from security exploits is to Threat Model the system architecture. This…Apr 13Apr 13
Tanveer Salim (Fosres)Source Code Auditing: A Horror StoryHarsh lessons on security audits from the great work “Building Secure Software”Apr 8Apr 8
Tanveer Salim (Fosres)Let’s Encrypt, RustTLS, and Divvi Up!How the Internet Security Research Group is improving our online security.Mar 24Mar 24
Tanveer Salim (Fosres)Why We are Failing at SecurityThere are three important ingredients in ensuring a security system designed to protect something valuable is used by others:Mar 9Mar 9
Tanveer Salim (Fosres)How To Store Your Net Worth in CryptocurrencyImagine a real person is serious about storing their entireFeb 9, 2022Feb 9, 2022
Tanveer Salim (Fosres)How I Replaced Dropbox with Rsync and WhyWho doesn’t love cloud storage services like Dropbox?Jan 21, 20204Jan 21, 20204