{"id":978,"date":"2021-02-03T14:15:33","date_gmt":"2021-02-03T20:15:33","guid":{"rendered":"http:\/\/dc612.org\/?p=978"},"modified":"2021-02-03T14:15:33","modified_gmt":"2021-02-03T20:15:33","slug":"thursday-february-11th-612pm-virtual","status":"publish","type":"post","link":"https:\/\/dc612.org\/index.php\/2021\/02\/03\/thursday-february-11th-612pm-virtual\/","title":{"rendered":"Thursday, February 11th \u2013 6:12pm @ Virtual"},"content":{"rendered":"\n<p>Hello hackers!<\/p>\n\n\n\n<p>This month we are happy to have <a href=\"https:\/\/twitter.com\/colinmlee\">Colin Lee<\/a> speak on &#8220;Your Code Security Blanket&#8221;:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Colin is an Android software developer at <a rel=\"noreferrer noopener\" href=\"https:\/\/t.co\/dgheYJc0Ok?amp=1\" target=\"_blank\">http:\/\/Meetup.com<\/a>. He has evaluated code security while working at Amazon and Mozilla and as an independent contractor for banks and other organizations. In that time, he&#8217;s caught numerous security flaws in production code.<\/p><p>Amazon keeps a tight lid on their security processes. They even run an internal conference designed to look and feel like Defcon for their employees, so very few attend the real event.<\/p><p>We&#8217;ll examine how Amazon reviews their corporate code for security flaws. Also, we&#8217;ll see how several high profile security incidents were caused by common coding errors.<\/p><\/blockquote>\n\n\n\n<p>As usual these days of Covid, we will be meeting online at <a href=\"https:\/\/cafe.cyberia.club\/dc612\">https:\/\/cafe.cyberia.club\/dc612<\/a>.<\/p>\n\n\n\n<p>&#8212; TactiFail<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hello hackers! This month we are happy to have Colin Lee speak on &#8220;Your Code Security Blanket&#8221;: Colin is an Android software developer at http:\/\/Meetup.com. He has evaluated code security while working at Amazon and Mozilla and as an independent contractor for banks and other organizations. In that time, he&#8217;s caught numerous security flaws in [&hellip;]<\/p>\n","protected":false},"author":2331,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-978","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts\/978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/users\/2331"}],"replies":[{"embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/comments?post=978"}],"version-history":[{"count":1,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts\/978\/revisions"}],"predecessor-version":[{"id":979,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts\/978\/revisions\/979"}],"wp:attachment":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/media?parent=978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/categories?post=978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/tags?post=978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}