nohehf (@nohehf) 's Twitter Profile
nohehf

@nohehf

security, software, engineering, experimentations & fun @ escape . tech

ID: 1602855410

calendar_today18-07-2013 07:50:49

325 Tweet

99 Followers

300 Following

Terkel Gjervig (@terkelg) 's Twitter Profile Photo

Revamped my personal GitHub profile readme! 🎉 I’ve made a fully responsive website inside an SVG, loaded as an image, using HTML, inside markdown, inside a readme​.md. Not only is it interactive and supports light/dark mode, but it also includes a fallback for Firefox😂#github

GraphQL (@graphql) 's Twitter Profile Photo

So many #GraphQL experts from around the world are at Paris this week for apidays Global and #GraphQLday ! We've gathered them all for a free and open Meetup for everyone to join at Escape this Thursday evening! Signup and don't miss out: meetup.com/parisgraphql/e… #APIDays

So many #GraphQL experts from around the world are at Paris this week for <a href="/APIdaysGlobal/">apidays Global</a> and #GraphQLday !

We've gathered them all for a free and open Meetup for everyone to join at <a href="/escapetechHQ/">Escape</a> this Thursday evening!

Signup and don't miss out:
meetup.com/parisgraphql/e…
#APIDays
Escape (@escapetechhq) 's Twitter Profile Photo

🚀 Want to leverage the power of the community to secure your GraphQL? Dive into the latest @NoheHf 's article on The Guild's blog and explore the best #opensource practices 👇 the-guild.dev/blog/open-sour…

Anders Hejlsberg (@ahejlsberg) 's Twitter Profile Photo

Probably the most issues I've closed in a single PR. Happy we're finally able to improve this. @TypeScript github.com/microsoft/Type…

HaxRob (@haxrob) 's Twitter Profile Photo

Andres Freund, the principal software engineer at Microsoft who discovered the xz backdoor really does deserve a big pat on the back. 👏 The outcome could have been much, much worse.

Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

🤯 The level of sophistication of the XZ attack is very impressive! I tried to make sense of the analysis in a single page (which was quite complicated)! I hope it helps to make sense of the information out there. Please treat the information "as is" while the analysis

🤯 The level of sophistication of the XZ attack is very impressive! I tried to make sense of the analysis in a single page (which was quite complicated)! 

I hope it helps to make sense of the information out there. Please treat the information "as is" while the analysis
ludwig (@ludwigabap) 's Twitter Profile Photo

This is the biggest mindset issue that many, many devs suffer from imo. "Why would you roll your own lib? Just [popular lib instead]" "Why are you building your own game engine? Use Unity/Godot" "Rolling your own JS frameowrk? Just use React bro." "Why would you write your own

This is the biggest mindset issue that many, many devs suffer from imo.

"Why would you roll your own lib? Just [popular lib instead]"
"Why are you building your own game engine? Use Unity/Godot"
"Rolling your own JS frameowrk? Just use React bro."
"Why would you write your own
nohehf (@nohehf) 's Twitter Profile Photo

Yo, I recently worked on cloudfinder, a little cli / golang package to detect which cloud provider an IP / host / url / domain belongs to. It's static, offline and very fast + bonus, it allows to track those cloud providers IPs over time. Check it out :) github.com/Escape-Technol…

Matthew Prince 🌥 (@eastdakota) 's Twitter Profile Photo

Not all records you’re happy about breaking: Cloudflare recently mitigated the largest ever reported hyper-volumetric #DDoS attack. 3.8 terabits per second (Tbps) and 2.14 billion packets per second (Bpps). Handled automatically any without any customer impact. Details to come.

Not all records you’re happy about breaking: <a href="/Cloudflare/">Cloudflare</a> recently mitigated the largest ever reported hyper-volumetric #DDoS attack. 3.8 terabits per second (Tbps) and 2.14 billion packets per second (Bpps). Handled automatically any without any customer impact. Details to come.
Escape (@escapetechhq) 's Twitter Profile Photo

🇩🇪 Meet the Escape team in Berlin! Come to meet our team - Antoine Carossio & nohehf , at BSides Berlin this Saturday and learn how to secure your GraphQL APIs. Check out the conference schedule 👉 bsides.berlin

🇩🇪 Meet the Escape team in Berlin!

Come to meet our team - <a href="/iCarossio/">Antoine Carossio</a>  &amp; <a href="/nohehf/">nohehf</a> , at BSides Berlin this Saturday and learn how to secure your GraphQL APIs.

Check out the conference schedule 👉 bsides.berlin