| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
The problem with federated web apps| www.devever.net
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
Why the GDPR is a threat to a free internet and should be ignored by those outside the EU| www.devever.net
A thought experiment: High-Availability IRC| www.devever.net
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
| devever.net/~hl (Articles)
Notes on building lexers| www.devever.net
Client certificates aren't universally more secure| www.devever.net
The different kinds of authentication protocols| www.devever.net
Cloudflare considered harmful| www.devever.net
On Normativity in Configuration Management| www.devever.net
Why I will never use Windows 8 or Windows 10| www.devever.net
Why Intel will never let owners control the ME| www.devever.net
Rethinking files| www.devever.net
Expect-CT Lite: A humble proposal for minimal CT enforcement in TLS certificates| www.devever.net
Mitigating the Hetzner/Linode XMPP.ru MitM interception incident, part 2: XMPP-specific mitigations| www.devever.net
Mitigating the Hetzner/Linode XMPP.ru MitM interception incident| www.devever.net
Alice: I'd sure like to talk to Bob sometime. If only there were some kind of communications| www.devever.net
Memoirs from the old web: IE's crazy content rating system| www.devever.net
Memoirs from the old web: The KEYGEN element| www.devever.net
Against risk-based authentication (or, why I wouldn't trust Google Cloud)| www.devever.net
Producing HTML using string templates has always been the wrong solution| www.devever.net
Let's Encrypt now supports ACME-CAA: closing the DV loophole| www.devever.net
The Demise of the Mildly Dynamic Website| www.devever.net
On Nexuses| www.devever.net
Microsoft has stopped making Windows| www.devever.net
The Cultural Defeat of Microsoft| www.devever.net
Phone numbers must die| www.devever.net
Adventures in reverse engineering Broadcom NIC firmware| www.devever.net
Extended Validation certificates have always been useless| www.devever.net
Rethinking the filesystem as global mutable state, the root of all evil| www.devever.net
The PowerPC AS Tagged Memory Extensions| www.devever.net
The evolution of the web, and a eulogy for XHTML2| www.devever.net
XML is almost always misused| www.devever.net
A taxonomy of I/O architectures| www.devever.net
Patterns in application-layer protocol design| www.devever.net