Panagiotis Moustafellos

@pmoust

Tech Lead Cloud SRE. Security. Opinions my own.

Athens, Greece
Vrijeme pridruživanja: srpanj 2014.

Tweetovi

Blokirali ste korisnika/cu @pmoust

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @pmoust

  1. 1. velj

    A well executed product in this space was missing. Checked what their team is and it looks like a sure bet. Even if for any reason they don't make it, at a minimum they can set a high bar on consumer products in the intersection of security, privacy and accessibility/UX.

    Prikaži ovu nit
    Poništi
  2. 1. velj

    So.. is, at a high level, extremely similar to what I was trying to build in early 2016. Goal was to provide a simple, secure, full mesh, encrypted VPN to users' device endpoints & networks. Seems like we elected the same /10 CIDR allocation for each mesh too *winks*

    Prikaži ovu nit
    Poništi
  3. 29. sij
    Poništi
  4. proslijedio/la je Tweet
    28. sij

    You can now see which privacy-violating companies send your browsing activity to Facebook and disable these integrations here:

    Poništi
  5. proslijedio/la je Tweet
    27. sij

    Have you ever thought about how you can suddenly afford having an army of servants driving you around, getting your food, and running your errands? The prime innovation in the gig economy is to bring back the oldest trick in the book: exploitation.

    Prikaži ovu nit
    Poništi
  6. 28. sij

    The paper on Circllhist log-linear histogram by & is published and can be found at . Including links to opensource implementations and code to reproduce their results.

    Poništi
  7. proslijedio/la je Tweet
    24. sij

    [$] The rapid growth of io_uring

    Poništi
  8. proslijedio/la je Tweet
    19. sij

    Your org is ready for chaos engineering when you are able to budget your reliability work instead of performing it reactively, and when you have enough observability* to reliably identify the chaos you have injected. *Not monitoring. Raw events and high cardinality are key here

    Poništi
  9. proslijedio/la je Tweet
    16. sij

    We’re excited to announce that our Service (hosted Elasticsearch and ) on is now available for deployment on the GCP region in Mumbai for a total of 10 regions globally 🎉

    Poništi
  10. proslijedio/la je Tweet
    15. sij

    We're proud to announce that on (ECK) is now generally available! With ECK, users have a seamless way to deploy, manage, and operate the on Kubernetes. Learn more →

    Poništi
  11. proslijedio/la je Tweet
    10. sij

    We're excited to announce the alpha release of an official client for . Learn more about getting started, see its design and roadmap, and let us know what you think →

    Poništi
  12. 10. sij

    The dependencies though, wow. My actual application's LoC "metric" is perhaps three orders of magnitude less than the deps LoC. Bloated, and can't be audited. But again, the dev experience is so juicy

    Prikaži ovu nit
    Poništi
  13. 10. sij

    So.. helped a friend build a thing with and I am so pleasantly surprised at how far the web dev ecosystem has gone. That's some solid RAD experience you get nowadays.

    Prikaži ovu nit
    Poništi
  14. 9. sij

    0ea07d0e757bf6206f82a1341815f84608faf59f 😎

    Poništi
  15. proslijedio/la je Tweet
    7. sij

    comparable to any hospital in the world. There hasn't been any clinical intervention in medicine within the last decade as effective as stroke thrombectomy. Uniquely, for medical advances, it is also hugely cost effective, with large reductions in rehab and social care costs.

    Prikaži ovu nit
    Poništi
  16. 5. sij

    Is it me being completely out of shape, or is successfully coming up w/ ROP gadgets gotten more difficult?

    Poništi
  17. proslijedio/la je Tweet
    4. sij

    WAR CRIME "Making the clearly-recognized historic monuments, works of art or places of worship which constitute the cultural or spiritual heritage of peoples ... the object of attack" Geneva Convention Protocol I (also: U.S. Department of Defense, Law of War Manual, 5.18)

    Prikaži ovu nit
    Poništi
  18. 4. sij
    Poništi
  19. proslijedio/la je Tweet

    New by me: Pulse Secure VPN flaw being used to deliver targeted ransomware to large organisations

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet

    ┏━━┓┏━━┓┏━━┓┏━━┓ ┗━┓┃┃┏┓┃┗━┓┃┃┏┓┃ ┏━┛┃┃┃┃┃┏━┛┃┃┃┃┃ CRYPTO MEANS USING MATHS FOR THE COMMON GOOD ┃┏━┛┃┃┃┃┃┏━┛┃┃┃┃ ┃┗━┓┃┗┛┃┃┗━┓┃┗┛┃ ┗━━┛┗━━┛┗━━┛┗━━

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·