Rob Janssen

In praise of “boring” technology

In this article I will explain how Spotify uses different mature and proven technologies in our backend service eco-system and architecture, and why we do so.

Framebase • The best programmers are the quickest to Google

Bypassing Google’s Two-Factor Authentication : Blog : Duo Security

TL;DR - An attacker can bypass Google’s two-step login verification, reset a user’s master password, and otherwise gain full account control, simply by capturing a user’s application-specific password (ASP).

Domain Knowledge or a Lack Thereof

I believe that a lack of domain knowledge is the root cause of a lot of very bad software that gets developed and I think that it is up to computer programmers and their managers to deal with this.

Latency Mitigation Strategies

Virtual reality (VR) is one of the most demanding human-in-the-loop applications from a latency standpoint.

Amdahl's law in reverse: the wimpy core advantage

Once a chip’s single-core performance lags by more than a factor to two or so behind the higher end of current-generation commodity processors, making a business case for switching to the wimpy system becomes increasingly difficult.

Clownspace

What does a buffoon do when his project is utterly out of code space, running late, and rather horribly extremely buggy? Why, he adds more features, of course! Contractor Figby: “Yes! Sure! Whatever you want!”

The StarCraft path-finding hack

Game-unit path-finding is something that most players never notice until it doesn’t work quite right, and then that minor issue becomes a rage-inducing, end-of-the-world problem. During the development of StarCraft there were times when path-finding just didn’t work at all.

How we hacked Facebook with OAuth2 and Chrome bugs

TL;DR We (me and @isciurus) chained several different bugs in Facebook, OAuth2 and Google Chrome to craft an interesting exploit. MalloryPage can obtain your signed_request, code and access token for any client_id you previously authorized on Facebook.

Data Serialization Is Different To Data Transfer!

Nearly everyone at this stage has heard about the huge rails vulnerabilities that were discovered this month. However, there is a lot of confusion and misinformation on the net about it, and what the primary causes of them were.

This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.

This list is compiled from my Pocket list.