Edit: Unfortunately, as of 2/20/2019, APPM is no longer available for download from the Chrome Store. Any user wishing to leverage this extension must do so in Developer Mode; I will not be attempting to re-publish this extension in the future. Recently, I’ve been spending more of my free time cleaning up my open-source work. […]
As part of my strategy to transition some of my skills from WPF to UWP (two standards of graphical user interfaces with C# that are fairly similar), I decided to do a full port of my Azure Key Vault Manager application into UWP. One of the most significant issues I ran into was around the authentication mechanism […]
Over the last several months, I’ve been doing a lot of work with Azure Key Vault, one of Microsoft’s new Azure service offerings. While I do really like the concept, I’ve never been a Powershell fan for simple maintenance tasks. Unfortunately, right now the only management option for Key Vault is via Powershell cmdlets. I decided […]
Thank you to Chris Kinsman and the Seattle .NET Developers Alliance for allowing me to speak on CryptInject and my thoughts on software security last night. It was a wonderful group and I had a great time! For anyone that is looking to read the slides as presented last night, they can be found here.
Have you ever wanted (or needed!) to encrypt a C# object’s children with potentially different keys or different methods? How, then, do you implement inline object encryption in a way that’s essentially transparent to a developer? I’ve been wondering about this issue for 5 years and finally decided to prototype it. This concept has come to fruition in […]
RT published an article today whose content made my inner computer security nerd tremble with rage. This uninformed kind of writing about cryptography makes me rage, so let me explain why your LastPass passwords aren’t being traded among foreign spies as we speak. LastPass stores things in two mediums. Usernames and e-mail addresses of its […]
The other day, a rather interesting browser “exploit” came to my attention, which utilizes the WebRTC technologies available in modern browsers (used for things like Google Hangouts, and is generally the de facto standard for any peer to peer streaming technology). I call it an exploit because of how it handles virtual interfaces, specifically when it comes […]