Open in app

Sign In

Write

Sign In

Zemnmez
Zemnmez

290 Followers

Home

About

Pinned

How to Hack Apple ID

Everyone knows what’s inside a computer isn’t really real. It pretends to be, sure, hiding just under the pixels — but I promise you it isn’t. In the real world, everything has a certain mooring we’re all attuned to. You put money in a…

Apple

22 min read

How to Hack Apple ID
How to Hack Apple ID
Apple

22 min read


Jul 18, 2021

Incomplete List of ways I would theoretically bully and confuse Julius Caesar

Riding a unicycle or bicycle up and down Eating a cake Wearing trousers Eating a refreshing slice of pineapple Checking the time Calling Rome “Italy” “Hey bud, have you invented your salad yet?” Referring to years as AD / BC instead of ‘ab urbe condita’ or the names of 2 consuls Vaguely and regularly bringing up ‘the fall of Rome’ and ‘your mate Brutus’ in passing and refusing to elaborate

1 min read

1 min read


Jun 12, 2021

Dawn is so beautiful and so perfect.

Dawn is so beautiful and so perfect. The grey light is not sleepy, but full of quiet life, as though the world had never slept while we did; but treated us to that illusion so that we might. The birds seem like they know this secret, as they drift through a world that’s theirs for now. I imagine myself in the streets, looking up at the clouds, and for a moment, seeing all we’ve made for what it is, than how we experience it when the sun is up and the air is full of voices.

1 min read

1 min read


Apr 6, 2021

Thomas’ Pizza Recipe

This is an extended version of Brian’s Pizza Recipe, which, because I’m a dumbass I fucked up a few times, with some amendments also from my brother who linked it to me. It also specifically describes toppings I like. …

Pizza

5 min read

Thomas’ Pizza Recipe
Thomas’ Pizza Recipe
Pizza

5 min read


Mar 31, 2021

Where The Dragons Are

For a discipline operating on the forefront of today’s technology, security for both better and worse has its roots in an almost universal super-cultural experience of safety that even as our society becomes expressed more and more on essentially imaginary electrical oscillations on a network, continues to work invisibly behind…

Information Security

4 min read

Where The Dragons Are
Where The Dragons Are
Information Security

4 min read


Mar 28, 2021

The Curse of ‘Fit for Purpose’

A grey kitchen lies before you. Therein stands a person attempting to peel an apple. Painstakingly, they cut it slowly bit-by-bit with a knife. “Couldn’t this be easier?” the advertisement asks. Clearly the answer is meant to be ‘yes’. Out comes a shiny contraption, where linkages make short work of…

4 min read

4 min read


Oct 19, 2020

Typescript Union Merging

Typescript has a concept called ‘Declaration Merging’. The idea is that some kinds of declarations can be specified multiple times, and the ‘final’ or ‘actual’ value is the result of those combined declarations: interface A { name: string } interface A { age: number } Here, we declare using declaration…

Typescript

2 min read

Typescript

2 min read


May 1, 2020

Why We Don’t Have UIs Like the ones in Neon Genesis

Every now and then, the incredible aesthetic quality of the UIs in Neon Genesis comes up. And for good reason. They’re incredibly cool. Everyone who works with interfaces should be looking at these and asking themselves why interfaces don’t look like this. Where did we go so wrong? Where’s the…

7 min read

Why We Don’t Have UIs Like the ones in Neon Genesis
Why We Don’t Have UIs Like the ones in Neon Genesis

7 min read


Aug 2, 2019

If CORS is just a header, why don’t attackers just ignore it?

Here’s a question from a co-worker I get quite often: Considering that curl requests do not have the restriction of the fetch API, how does this browser policy [CORS] prevent circumventing abuse or misuse of server endpoints if an attacker can anyways do so by default via curl? And since…

JavaScript

6 min read

If CORS is just a header, why don’t attackers just ignore it?
If CORS is just a header, why don’t attackers just ignore it?
JavaScript

6 min read


Dec 15, 2018

Übersicht Remote Code Execution, Spotify takeover

on the security implications of locally hosted web services — I. Spotify’s All Singing, All Dancing Musical Backdoor II. The Übersicht RCE III. Wrapping Up I try to bring this up whenever I have the chance to talk about application security architecture: the way we think about networks as boundaries is useful, but inadequate in 2018 and this has serious…

Web Development

15 min read

Übersicht Remote Code Execution, Spotify takeover
Übersicht Remote Code Execution, Spotify takeover
Web Development

15 min read

Zemnmez

Zemnmez

290 Followers

i’m trying http://twitter.com/zemnmez

Following
  • djWHEAT

    djWHEAT

  • Alice Kasper

    Alice Kasper

  • Jason Maestas

    Jason Maestas

  • Medium

    Medium

  • Jeff Bezos

    Jeff Bezos

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech