-
An analysis of the fork-safety of OpenSSL's Pseudo-Random Number Generator (PRNG), including a discussion of the Android SecureRandom incident, the impact of forking on PRNG state, and the implications of relying on uninitialized memory for entropy.
-
A comprehensive analysis of the need for signing Ruby Gems, exploring various code signing solutions from Java, Linux distros, Android, and iOS, and discussing their advantages and disadvantages in the context of RubyGems.
-
A detailed analysis of the hash-flooding DoS attack against MurmurHash, including a step-by-step explanation of how the attack works and how it can be mitigated.
-
An exploration of how Ruby's Enumerators are implemented for arbitrary objects, including a discussion of eager vs. lazy evaluation and the use of Fibers for efficient iteration.