Securing AWS Credentials

A single rogue npm module, Ruby gem, PyPi module, or ill-fated cURL command could expose you (and your employer) to extreme risk. Table of contents: Is this you? The Problem A Solution Do it Yourself Shortcuts Enable Privileges Disable Privileges...

Keybase

I first started using @KeybaseIO a few years ago to link together my social accounts. This creates a web of accounts which is dramatically more difficult to impersonate than any single account. So, it's an exercise in impeding identity theft. A...