Published: 19 January 2021 Tags: security, state machines
A lot of applications fundamentally run on a state machine. When you get to building more complex systems, issues in the state machines can become difficult to manage. In this article, Natalie Silvanovich explores some of the vulnerabilities in state machines that run messaging applications like Signal, JioChat, Mocha, Google Duo, and Facebook Messenger.
Published: 19 January 2021 Tags: javascript, security
Following along on the topic of security, in this article Omkar Hiremath describes what cross-site scripting is, how it's used in real life, and three different types of XSS attacks including reflected, stored, and DOM-based.
Published: 17 January 2021 Tags: math, functional programming
John Baez describes a Petri net as "[consisting] of places (drawn as circles) and transitions (drawn as boxes), with directed edges called arcs from places to transitions and from transitions to places". Don't understand? John's article goes much deeper into defining them and similar nets through the monoidal categories they generate.