May 10, 2015

Spam at the core of our security problem

Spam is not commonly considered when dealing with security, which is generally reduced to encryption, digital signatures, and uptime in the face of DDoS. Yet spam is key here. Email and chat servers function as electronic secretaries. They weed out spam so that we don't have to. End-to-end encryption blinds these electronic secretaries, which results in encrypted systems being overrun by spam, which causes people to abandon them and revert to unencrypted alternatives.

Ad-xtremism

I use ad-blockers. I rev them up to maximum settings. Normal people don't even blink about that. But people in the media would say that they have to earn money somehow. They support their families with the money. They even go as far as calling ad-blocking a form of piracy or stealing. Poor souls. They don't realize what force are they facing.

May 6, 2015

Can I trust your app?

Probably not. But is it even possible to trust anything these days? What would it take to make computers wholly trustworthy?

May 5, 2015

Who needs partition tolerance anyway?

Nobody takes the CAP theorem seriously anymore. Except a couple dozen NoSQL database vendors who justify their core architecture with it. The theory goes that in choosing two out of three, RDBMS would traditionally sacrifice partition tolerance while NoSQL databases would sacrifice consistency in the name of availability and partition tolerance. I however suspect that partition tolerance in NoSQL is motivated by ease of implementation more than by consideration of application requirements.