>400 subscribers
>400 subscribers
Philosophy Mondays: Human-AI Collaboration
Today's Philosophy Monday is an important interlude. I want to reveal that I have not been writing the posts in this series entirely by myself. Instead I have been working with Claude, not just for the graphic illustrations, but also for the text. My method has been to write a rough draft and then ask Claude for improvement suggestions. I will expand this collaboration to other intelligences going forward, including open source models such as Llama and DeepSeek. I will also explore other moda...

Intent-based Collaboration Environments
AI Native IDEs for Code, Engineering, Science
Web3/Crypto: Why Bother?
One thing that keeps surprising me is how quite a few people see absolutely nothing redeeming in web3 (née crypto). Maybe this is their genuine belief. Maybe it is a reaction to the extreme boosterism of some proponents who present web3 as bringing about a libertarian nirvana. From early on I have tried to provide a more rounded perspective, pointing to both the good and the bad that can come from it as in my talks at the Blockstack Summits. Today, however, I want to attempt to provide a coge...
Philosophy Mondays: Human-AI Collaboration
Today's Philosophy Monday is an important interlude. I want to reveal that I have not been writing the posts in this series entirely by myself. Instead I have been working with Claude, not just for the graphic illustrations, but also for the text. My method has been to write a rough draft and then ask Claude for improvement suggestions. I will expand this collaboration to other intelligences going forward, including open source models such as Llama and DeepSeek. I will also explore other moda...

Intent-based Collaboration Environments
AI Native IDEs for Code, Engineering, Science
Web3/Crypto: Why Bother?
One thing that keeps surprising me is how quite a few people see absolutely nothing redeeming in web3 (née crypto). Maybe this is their genuine belief. Maybe it is a reaction to the extreme boosterism of some proponents who present web3 as bringing about a libertarian nirvana. From early on I have tried to provide a more rounded perspective, pointing to both the good and the bad that can come from it as in my talks at the Blockstack Summits. Today, however, I want to attempt to provide a coge...
Share Dialog
Share Dialog
Caring about the security of your site or service is a bit akin to going to the dentist on a regular basis: It’s not pleasant, doesn’t really get you any visible results and costs time and money. Hence the people who care/go regularly are the ones who have had a bad experience by not doing so. In my own case that is now (sadly) true for both my teeth and security.
My exposure to computer security issues started in the fall of 1987 when I was a freshman at Harvard. We had a bunch of VAX machines (remember those?) running BSD Unix. I logged in repeatedly with the default account password that I had been given at the beginning of class. A week or so into classes when I logged in again, a little shell script ran saying something like “You should change your password! RTM" RTM is of course non other than Robert T. Morris (who graduated that year) and the following year created what became known as the first Internet or Morris worm (btw, lest anyone think differently I am an RTM fan). Since then I have encountered enough nefarious activity on the Internet that I take even far-fetched sounding concerns about the security of smart electricity grids seriously.
Most startups have extremely limited resources in terms of time and money and need to worry primarily about delivering a service that people will actually use. Having said that, there are a bunch of basic security items that no startup should ignore:
Guard against SQL injection attacks by using a framework or escaping inputs or using parameterized queries
Limit the potential for XSS attacks (like the one Twitter was hit with) by sanitizing user inputs that get displayed on the site (if you are asking a user for a color code, exclude anything from the input that is not a color code).
Limit access to your machines to traffic that is absolutely required using netfilter/iptables (in most cases that will just be http, https, ssh and maybe smtp, pop).
Don’t just use the default configuration files for Apache, PHP (or whatever you are using) and ssh. The defaults tend to have poor security and even a few minutes of work will make them more secure.
If you have a web based admin console for your service (who doesn’t?) make sure that it requires strong passwords and if it permits delete or modification operations have scripts ready to undo (soft delete is the way to go). Also run the web based admin over https to make password sniffing on wifi connections harder.
Avoid URLs based on auto-increment row ids, which make it easy for an attacker to traverse your entire database (there are also scaling reasons for avoiding these).
I am sure the list could be made longer, but these strike me as must-have items even when you are just getting started. Once your site or service takes off and you have many thousands or even millions of users (or significant ecommerce transactions) there will be lots of other things you have to do (such as external security audits and hiring ”paranoids“), but those are all great problems to be having!
![Reblog this post [with Zemanta]](https://img.paragraph.com/cdn-cgi/image/format=auto,width=3840,quality=85/http://img.zemanta.com/reblog_e.png?x-id=193ee69c-c7b9-41c0-875a-151d3012cc9f)
Caring about the security of your site or service is a bit akin to going to the dentist on a regular basis: It’s not pleasant, doesn’t really get you any visible results and costs time and money. Hence the people who care/go regularly are the ones who have had a bad experience by not doing so. In my own case that is now (sadly) true for both my teeth and security.
My exposure to computer security issues started in the fall of 1987 when I was a freshman at Harvard. We had a bunch of VAX machines (remember those?) running BSD Unix. I logged in repeatedly with the default account password that I had been given at the beginning of class. A week or so into classes when I logged in again, a little shell script ran saying something like “You should change your password! RTM" RTM is of course non other than Robert T. Morris (who graduated that year) and the following year created what became known as the first Internet or Morris worm (btw, lest anyone think differently I am an RTM fan). Since then I have encountered enough nefarious activity on the Internet that I take even far-fetched sounding concerns about the security of smart electricity grids seriously.
Most startups have extremely limited resources in terms of time and money and need to worry primarily about delivering a service that people will actually use. Having said that, there are a bunch of basic security items that no startup should ignore:
Guard against SQL injection attacks by using a framework or escaping inputs or using parameterized queries
Limit the potential for XSS attacks (like the one Twitter was hit with) by sanitizing user inputs that get displayed on the site (if you are asking a user for a color code, exclude anything from the input that is not a color code).
Limit access to your machines to traffic that is absolutely required using netfilter/iptables (in most cases that will just be http, https, ssh and maybe smtp, pop).
Don’t just use the default configuration files for Apache, PHP (or whatever you are using) and ssh. The defaults tend to have poor security and even a few minutes of work will make them more secure.
If you have a web based admin console for your service (who doesn’t?) make sure that it requires strong passwords and if it permits delete or modification operations have scripts ready to undo (soft delete is the way to go). Also run the web based admin over https to make password sniffing on wifi connections harder.
Avoid URLs based on auto-increment row ids, which make it easy for an attacker to traverse your entire database (there are also scaling reasons for avoiding these).
I am sure the list could be made longer, but these strike me as must-have items even when you are just getting started. Once your site or service takes off and you have many thousands or even millions of users (or significant ecommerce transactions) there will be lots of other things you have to do (such as external security audits and hiring ”paranoids“), but those are all great problems to be having!
![Reblog this post [with Zemanta]](https://img.paragraph.com/cdn-cgi/image/format=auto,width=3840,quality=85/http://img.zemanta.com/reblog_e.png?x-id=193ee69c-c7b9-41c0-875a-151d3012cc9f)
No comments yet