Technology Short Take 171
Welcome to Technology Short Take #171! This is the next installation in my semi-regular series that shares links and articles from around the interwebs on various technology areas of interest. Let the linking begin!
Networking
The networking section this time around is focused on application level protocols…but hey, they’re still networking protocols, right?
- This post is the first of a three-part series on the core concepts of HTTP/3.
- Although the title of this article says “for Go programmers,” I still found it to be a well-written and understandable explanation of CORS (and I’m no Go programmer—yet).
Security
- Undetectable cryptomining technique on Azure? Yikes.
- Stealing cryptographic keys from SSH? Double yikes. (Fortunately, the fix for this is easy—don’t use RSA keys.)
- A UEFI flaw, affecting both Windows and Linux, that leverages malicious images? Triple yikes.
- Nick Frichette shows how to enumerate a principal ARN from an AWS unique identifier.
Cloud Computing/Cloud Management
- Veronica Gnilitska shared some thoughts on why Masterpoint investigated Crossplane but ended up sticking it out with Terraform.
- Trevor Roberts Jr. takes readers through how to allow GCP resources to assume AWS IAM roles—all using Pulumi, of course!
- Bill Shetti, a friend and former colleague of Continue reading
