Actually there are no HTTP POLICE, they don't exist, but "curl" does and people like using it, and so ordinary GET requests that make non-idempotent actions are super-super common. People even avoid query strings because bash screws them up. THERE ARE NO BASH POLICE EITHER.
-
-
This Tweet is unavailable.
-
Once I saw DANE I lost interest, DNSSEC is train wreck awful. Do not use.
- 32 more replies
-
-
-
Did I also hear that TLS1.3 has a much smaller cypher suite, selected such that a sensible relatively secure cypher suit to configure your server with is the TLS1.3 cypher suite? That alone is reason for celebration in my book
-
Yep! TLS1.3 cleans the slate and rid of things like RC4, 3DES, CBC so we're left with good AEAD only goodness.
End of conversation
New conversation -
-
-
Thanks for the thread. I couldn't help but imagine you in a infomercial for TLS 1.3 while reading this. "Get it while it's hot! Security for everyone!" <3
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Heard of a blog?
-
For real, though. Why did everyone suddenly decide Twitter is a blogging platform now?
End of conversation
New conversation -
-
This Tweet is unavailable.
-
-
Awesome thread. You were right. So, s2n, deploy to CF, ELB, and then done for the week?
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Are clients likely to support a “Don’t use 0-RTT” option?
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.