I'm not ashamed to admit that sometimes I miss PHP.
Over 20 years later, and still nobody's even come _close_ to PHP's ease of deployment.
This tweet brought to you by the 3 programming languages and 5 Docker images I need just to run one app.
Turns out having what I thought was a mild opinion about web app deployment was an invitation for people to yell at me, assume I'm stupid, or sell me thier Next Great Thing.
Ugh.
The thing that boggles my mind is how people just assume no nuance whatsoever. Most replies seem to think that I don't get that there are good reasons things got more complex, or that I don't know there are downsides to yolo editing in production, or etc.
Like, I can miss a thing and also understand why we've moved on. And the new thing can be worse in ways and still worth using.
Are so many people really incapable of understanding nuanced thought? Or is there something about Twitter that affords such binary thinking?
This is what I'm taking about. Who does this, and why?
This appears to be the worst-case scenario: compromise of Heroku’s own core database. I’m afraid this is going to continue to get worse. I won’t be surprised if env vars got popped too.
What I’m going to be doing/have done:
- change my account passwords
- reset my totp second factors
- rotate all my database credentials
- rotate all ssl private keys
- invalidate and re-set-up log drains
- audit all my env vars and rotate any secrets
Overkill? Perhaps.
Unfortunately, Heroku/Salesforce’s comms here really suck, so I can’t be sure this isn’t overkill. At this point onus is on them to prove that env vars and db creds WEREN’T popped.
A lot of people in my TL are angry about open source orgs not getting invited to the WH OSS Security summit. I normally don't write about OSS any more because I get flamed, but fuck it here goes.
This anger is misdirected and based on serious misunderstandings. 🧵
First, what is this event anyway?
It's not an event where decisions get made. They're mostly about optics and politics, The people who attend — CEOs and other executives, and their Gov't counter-parties — don't do the work. Most barely understand open source or security.
These types of events _can_ be important, but really only as the very beginning of any real work. In the best case these events merely create the political top-cover for people in the trenches to do the work.
PSA: if you're in tech, know that comp is up A LOT (10% - 50%) over last year. This is most pronounced at FAANG and for Senior-plus level engineering roles, but is true to a lesser extent nearly everywhere I've looked. If you're looking, or thinking about a raise: ask for more.
If you'd like a gut check on your salary, or an offer you're looking at, or on what you might ask for: please reach out. I'm happy to share what I'm seeing, and any thoughts specific to you and your role.
To give one specific example: I know of a few people — staff-plus engineers; director-plus managers — making over $1M in total comp. These are outliers, but before 2021 I'd only heard of those much at those levels once or twice; now I know of at least a half-dozen.
So much this. A physical breach is a nightmare scenario for infosec.
On the off-chance that any of my followers are involved in this -- I do have some experience in scenarios like this and would be happy to help. If I can be of assistance hit me up.
Just to give folks who aren't in the field an idea what we're talking about:
- we must assume that foreign agents were among the rioters
- snooping devices can be implanted into anything with a power cord
- so every device in the capitol is now a potential foreign asset
So, just for starters:
- all computers need to be inventoried, inspected inside and out, and the OS paved/rebuilt
- keyboards, mice, &c might now have implants, they probably should be tossed (see eg keelog.com/forensic-keylo… which looks like a usb cable but is in fact a logger)