An end to daily blogging


Screenshot of a calendar of my daily blogging.

If you explore this blog's archives, you'll see that I've been blogging continuously every day since the start of 2020. Before that, I was blogging every month since mid-2008. Today, I am very hungover. Although I usually write a bunch of posts a few days and weeks in advance, I find myself looking at my […]

Continue reading →

Can time-travellers use TOTP codes?


A chunky wristwatch showing the time and a selection of 6 digit codes and their corresponding entities.

Imagine, just for a moment, you and your friends decide to travel in time. In order to make sure you can authenticate your communications with each other, you set up a shared Time-based One Time Password (TOTP). The TOTP algorithm uses a Hash-based Message Authentication Code (HMAC). The hash is calculated from a shared key […]

Continue reading →

We've received a letter about you


Royal coat of arms of the UK. A lion and a unicorn.

This is a retropost. It was written in July 2021, but published after I had left the Civil Service. An MP has written to the Chancellor of the Duchy of Lancaster asking about some work our department is doing. This is all rather usual for Government business. In the letter, the MP mentions me. By […]

Continue reading →

How random are TOTP codes?


Histogram of distributions. 8 is clearly higher than the rest.

I'm pretty sure that the 2FA codes generated by my bank's TOTP app have a bias towards the number 8 - because eight is an auspicious number. But is that just my stupid meaty brain noticing patterns where none exist? The TOTP algorithm uses HMAC, which in turn uses SHA-1. My aforementioned brain is not […]

Continue reading →

Password Resets in an Age of MFA


A padlock engraved into a circuit board.

Recently, WordPress got in contact with me to say they suspect that my password was exposed in some sort of data breach. Well, it's a day ending with a "y" - so of course some scumbag has pilfered my digital identity. WordPress mandated that I change my password. But was that really necessary? Firstly, the […]

Continue reading →

The complexity is the attraction - reflections on trying to use crypto


A fiver and some coins on a table.

A few weeks ago, someone wanted to send me some crypto. After spending months studying for a Blockchain exam, I usually avoid such things. But, hey, $20 is $20. So I signed up for a wallet, installed an extension, verified my credentials, saved a seed phrase, and - without too much technical fuss - had […]

Continue reading →

The Bite


3D printed jaw with resin scaffolding.

A glistening pool of blood gently wept from the body. Crimson gore sparkled under rapid flash photography as it loosely clung to the wounds. So many wounds. Too many for this to have been an accident. "Bite marks," said the forensics officer. "A lot of bite marks." The detective peered at the ragged corpse. It […]

Continue reading →

Review: dbrand skin for FrameWork laptop


Stickers attacked to the underside of the laptop.

I love putting stickers on my laptops. But when it's time to move to a different laptop, what happens to all those cool stickers? After spending too many nights with a scraper and isopropanol, I decided to get a pre-cut dbrand skin. It'll protect the laptop and it will peel off in one piece, allowing […]

Continue reading →

The irony of TicketMaster's breach notification email


What is Ticketmaster doing to protect customers? We have been working with industry-leading cybersecurity experts, the relevant authorities, including law enforcement, as well as credit card companies and banks. No further unauthorised activity has been seen in the cloud database since we began our investigation. We are offering you a free 12-month identity monitoring service with TransUnion. These services will be provided by Cyberscout, a TransUnion company specialising in fraud assistance and remediation services. You can sign up for this service through the following link: https://bit.ly/TU-sign-up What can I do? There is nothing you need to do. However, exposure of personal information can, in some cases, increase the risk of identity theft or fraud, so it’s always a good idea to monitor your bank accounts. If you notice any suspicious activity, contact your bank and/or credit card companies. Be cautious of unsolicited emails from unknown senders, especially those with unusual content, links, attachments, or requests for personal information over the phone. If you have any questions, you can visit https://bit.ly/Ticketmaster-Data-Security-Incident or contact us at ticketmastersupport@ticketmaster.com. Ticketmaster understands the importance of your personal information and we take its protection very seriously. We apologise for having to write to you in these circumstances.

TicketMaster has joined the long list of companies to lose their customers' information. As is common, they sent out an email to warn poor sods like me who might have had our details snaffled. Their email is particularly poor and contains a delightful example of how not to communicate issues like this. See if you […]

Continue reading →

Book Review: Dystopia X - A.E. Currie


Book cover.

Another one in the Panopticon series. Bouncy sci-fi which scattershoots its plots all over the place. VR, Mission to Mars, evil AI, underwater cities, eyeless technomages - this has it all. It probably has a little too much crammed in. But, hey, it's a great ride. A cliffhanger every other chapter, vaguely plausible science, and […]

Continue reading →