Articles by ramimac
178

Child's Play: Tech's new generation and the end of thinking (harpers.org)

1

Building Multi-Agent Systems (Part 3) (sshh.io)

55

Okta's NextJS-0auth troubles (joshua.hu)

1

Visibility at scale: How Figma detects sensitive data exposure (figma.com)

1

If Managers Were Angels (bonnycode.com)

1

Dismantling a Critical Supply Chain Risk in VSCode Extension Marketplaces (wiz.io)

3

Eleven Missing Terraform Features (josnyder.com)

10

Supply Chain Attacks on Linux Distributions (fenrisk.com)

3

GitHub Action supply chain attack: reviewdog/action-setup (wiz.io)

2

History: What Happened with Ciscogate (cybersect.substack.com)

1

My LLM Codegen Workflow (harper.blog)

1

Thirty Things (timiajiboye.com)

6

Codename Goose (block.github.io)

149

Hacking Subaru: Tracking and controlling cars via the admin panel (samcurry.net)

2

Big Bets (jackdanger.com)

3

Story of a Pentester Recruitment (silentsignal.eu)

1

Systematizing Systematization of Knowledge (oaklandsok.github.io)

1

SoK: On the Offensive Potential of AI (sok-offensive-ai.github.io)

1

A User's Guide to Building a Subculture (asteriskmag.com)

21

The death of Glitch, the birth of Slack (buildingslack.com)

1

(Re)-Introducing La Cryptographie Militaire (militarycryptography.xyz)

3

Security ProbLLMs in XAI's Grok (embracethered.com)

1

Encryption using data-specific keys (cash.app)

1

Death Generator: Create Game over/You Died Screens (deathgenerator.com)

4

Ninja Threat Modeling (2009) (archive.org)

2

The Secret School for the Best Founders (generalist.com)

2

To Build a Meritocracy (max.levch.in)

1

Source and Binary has ceased operations (rcrowley.org)

33

Client-side filtering of private data is a bad idea (mjg59.dreamwidth.org)

6

Google Pixel Phones Have Unpatched Flaw in Hidden Android App (wired.com)

23

Revealing the Inner Structure of AWS Session Tokens (medium.com/talbeerysec)

1

Using Infostealer Logs to Unmask CSAM Consumers (recordedfuture.com)

0

Our Approach to Building Security Tooling (latacora.com)

2

Summary of the [June] AWS Lambda Service Event in US-East-1 (amazon.com)

0

Designer Vulnerabilities (shellsharks.com)

2

Dell Inc.: A Masterclass in Capital Management (every.to/p)

1

Secret Ingredients, Trade Secrets, and the “Onion in the Varnish” (scopeofwork.net)

8

Jessica Hische Brings New Life to an Old Logo (printmag.com)

1

Benedict Evans's Presentations (ben-evans.com)

2

When, not if: The playbook method for managing risk (leaddev.com)

1

Coinbase Account Take over Statistics (coinbase.com)

1

‘Office Space’ inspired WA software engineer’s theft scheme, prosecutors say (seattletimes.com)

1

Why It’s So Hard to Become a Staff Engineer (jkebertz.medium.com)

4

2022 Jealousy List (bloomberg.com)

1

Amazon Pre-Sale for AMZ (amazontokens.io)

146

Why do new cars look like wet putty? (blackbirdspyplane.com)

1

My CI/CD pipeline is my release captain (amazon.com)

1

Upward Mobility (pudding.cool)

2

Performance “Seasons” Are Useless – Use Anniversary Reviews Instead (jacobian.org)

14

NPR Is Not Your Friend (currentaffairs.org)

1

How to hire and build your cybersecurity team

1

A Twitter plan to counter extremism fell apart

1

Building Layoffs on a Healthy Foundation

1

More Than a Semblance of Self

8

Twitter’s child porn problem ruined its plans for an OnlyFans competitor

1

Information Management

1

Technical Evaluation of a Startup

1

An Engineering Manager's Bill of Rights (and Responsibilities)

1

The Product Culture Shift