One person – many ideas!
OpenSSH support for U2F/FIDO2
Finally, you can use the your soloKey or other U2F key with openSSH. It is still very early support so you will have to do a bit of compiling yourself. Here’s how!
Edward Snowden in Joe Rogan show
An fantastic interview with Edward Snowden for the Joe Rogan show. Almost 3 hours about the mass-surveillance going on in this world.
Happy Birthday UNIX – 50 years
Who would have known that a fun project (originating from a computer game idea) would end up 50 years later as being the ground work for most modern operating systems? Happy Birthday to UNIX 50 years.
Password-less linux login with SoloKeys
Sometimes a hardware key is not for added security but simply for added simplicity. This time I give a quick intro to how you can use a SoloKey (or other U2F/FIDO2 HW key) as a quick Linux login mechanism.
Using SoloKey for Linux Login
If you want to have extra security for your linux machine besides the usual password. Then get yourself a SoloKey or other hardware U2F key and use that as secondary login. Here I give you the description on how to install and configure everything for using Solokeys with your linux. Enjoy!
Security keys – everyone should have at least one!
I spend a lot of my time on IT security and related subjects. This is also why you will always find at least 1-2 hardware security keys on me when I move around. This time I tell a bit about the three types I primarily use.
Cloud services with “enough” storage
Sometimes you need a lot of storage in the cloud and services like dropbox and google drive just don’t give you enough space (unless you pay a lot of money each month). I have been looking a bit at the 1TB+ cloud services and found my favorite among them.
fun() != fun(void) in C
Many C-programmers do not realize that fun() != fun(void) unless they have a C++ background.
Vim Tip#1: close all other buffers
What should you do when you have 50+ buffers open in Vim? This is my trick.
A visit from an unknowingly visited site
A little story about broken computer systems and how even big diamond companies don’t seem to care about security.