<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 08 Apr 2026 01:27:40 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Networking”</title>
    <link>https://techsnap.systems/tags/networking</link>
    <pubDate>Fri, 01 May 2020 00:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>428: RAID Reality Check</title>
  <link>https://techsnap.systems/428</link>
  <guid isPermaLink="false">5556e3df-292d-4b0b-8e25-27f071862c06</guid>
  <pubDate>Fri, 01 May 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/5556e3df-292d-4b0b-8e25-27f071862c06.mp3" length="25930419" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</itunes:subtitle>
  <itunes:duration>36:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.
Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers. 
</description>
  <itunes:keywords>DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, EPYC, Threadripper, AMD, 7FX2, CPU, per-core performance, Intel, Threadripper, TDP, energy efficiency, RAID, md-raid, ZFS, hard disk performance, iops, hard drive, storage, Seagate, Iron Wolf, raidz, raidz2, RAID-5, RAID-6, RAID-10, ZFS, backups, fio, benchmarking, data integrity, BGP, Cloudflare, networking, RPKI, security, cryptography, route leak, routing, isbgpsafeyet, internet, systemd, systemd timers, cron, email, monitoring, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</p>

<p>Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers.</p><p>Links:</p><ul><li><a title="AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs" rel="nofollow" href="https://www.tomshardware.com/news/amd-worlds-fastest-processor-epyc-rome-7fx2-cpus">AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs</a></li><li><a title="AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=amd-epyc-7f52&amp;num=1">AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review</a></li><li><a title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/">Understanding RAID: How performance scales from one disk to eight</a></li><li><a title="New Cloudflare tool can tell you if your ISP has deployed BGP fixes" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/new-cloudflare-tool-can-tell-you-if-your-isp-has-deployed-bgp-fixes/">New Cloudflare tool can tell you if your ISP has deployed BGP fixes</a></li><li><a title="Is BGP safe yet?" rel="nofollow" href="https://isbgpsafeyet.com/">Is BGP safe yet?</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="Why I Prefer systemd Timers Over Cron – Thomas Stringer" rel="nofollow" href="https://trstringer.com/systemd-timer-vs-cronjob/">Why I Prefer systemd Timers Over Cron – Thomas Stringer</a></li><li><a title="systemd/Timers - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Systemd/Timers">systemd/Timers - ArchWiki</a></li><li><a title="systemd.time (Time format docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.time.html">systemd.time (Time format docs)</a></li><li><a title="systemd.timer (Unit docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.timer.html">systemd.timer (Unit docs)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We dive deep into the world of  RAID, and discuss how to choose the right topology to optimize performance and resilience.</p>

<p>Plus Cloudflare steps up its campaign to secure BGP, and why you might want to trade in cron for systemd timers.</p><p>Links:</p><ul><li><a title="AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs" rel="nofollow" href="https://www.tomshardware.com/news/amd-worlds-fastest-processor-epyc-rome-7fx2-cpus">AMD Claims World’s Fastest Per-Core Performance with New EPYC Rome 7Fx2 CPUs</a></li><li><a title="AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=amd-epyc-7f52&amp;num=1">AMD EPYC 7F52 Linux Performance - AMD 7FX2 CPUs Further Increasing The Fight Against Intel Xeon Review</a></li><li><a title="Understanding RAID: How performance scales from one disk to eight" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/understanding-raid-how-performance-scales-from-one-disk-to-eight/">Understanding RAID: How performance scales from one disk to eight</a></li><li><a title="New Cloudflare tool can tell you if your ISP has deployed BGP fixes" rel="nofollow" href="https://arstechnica.com/information-technology/2020/04/new-cloudflare-tool-can-tell-you-if-your-isp-has-deployed-bgp-fixes/">New Cloudflare tool can tell you if your ISP has deployed BGP fixes</a></li><li><a title="Is BGP safe yet?" rel="nofollow" href="https://isbgpsafeyet.com/">Is BGP safe yet?</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="Why I Prefer systemd Timers Over Cron – Thomas Stringer" rel="nofollow" href="https://trstringer.com/systemd-timer-vs-cronjob/">Why I Prefer systemd Timers Over Cron – Thomas Stringer</a></li><li><a title="systemd/Timers - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Systemd/Timers">systemd/Timers - ArchWiki</a></li><li><a title="systemd.time (Time format docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.time.html">systemd.time (Time format docs)</a></li><li><a title="systemd.timer (Unit docs)" rel="nofollow" href="https://www.freedesktop.org/software/systemd/man/systemd.timer.html">systemd.timer (Unit docs)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>426: Storage Stories</title>
  <link>https://techsnap.systems/426</link>
  <guid isPermaLink="false">658dd254-b721-4281-8415-9357e180e92b</guid>
  <pubDate>Fri, 03 Apr 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/658dd254-b721-4281-8415-9357e180e92b.mp3" length="22528023" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at Cloudflare's impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.</itunes:subtitle>
  <itunes:duration>31:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at Cloudflare's impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.  
Plus we celebrate WireGuard's inclusion in the Linux 5.6 kernel, and fight some exFAT FUD. 
</description>
  <itunes:keywords>WireGuard, Linux 5.6, kernel module, networking, encryption, security, Ubuntu, Debian, Windows, zonefs, Zoned Storage, SMR, Shingled Magnetic Recording, SSD, NVMe, firmware, block device, dm-zoned, filesystems, device mapper, Western Digital, ZFS, RAID, Seagate, Microsoft, Samsung, Google, Andoird, Paragon Software, exFAT, FUD, open source, free software, NTFS, NTFS-3G, SMB, Samba, Cloudfare, crypto, dm-crypt, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at Cloudflare&#39;s impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.  </p>

<p>Plus we celebrate WireGuard&#39;s inclusion in the Linux 5.6 kernel, and fight some exFAT FUD.</p><p>Links:</p><ul><li><a title="WireGuard VPN makes it to 1.0.0—and into the next Linux kernel" rel="nofollow" href="https://arstechnica.com/gadgets/2020/03/wireguard-vpn-makes-it-to-1-0-0-and-into-the-next-linux-kernel/">WireGuard VPN makes it to 1.0.0—and into the next Linux kernel</a> &mdash; It's a good day for WireGuard users—DKMS builds will soon be behind us.
</li><li><a title="Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=linux-56-features&amp;num=1">Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features</a></li><li><a title="fs: New zonefs file system" rel="nofollow" href="https://lwn.net/Articles/793585/">fs: New zonefs file system</a> &mdash; zonefs is a very simple file system exposing each zone of a zoned block device as a file. This is intended to simplify implementation of application zoned block device raw access support by allowing switching to the well known POSIX file API rather than relying on direct block device file ioctls and read/write.</li><li><a title="Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6" rel="nofollow" href="https://blog.westerndigital.com/zonefs-file-system-linux-5-6/">Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6</a></li><li><a title="What is Zoned Storage and the Zoned Storage Initiative?" rel="nofollow" href="https://blog.westerndigital.com/what-is-zoned-storage-initiative/">What is Zoned Storage and the Zoned Storage Initiative?</a> &mdash; Zoned Storage is a new paradigm in storage motivated by the incredible explosion of data. Our data-driven society is increasingly dependent on data for every-day life and extreme scale data management is becoming a necessity. </li><li><a title="Linux Kernel Support - ZonedStorage.io" rel="nofollow" href="https://www.zonedstorage.io/introduction/linux-support/">Linux Kernel Support - ZonedStorage.io</a></li><li><a title="dm-zoned" rel="nofollow" href="https://www.kernel.org/doc/html/latest/admin-guide/device-mapper/dm-zoned.html">dm-zoned</a> &mdash; The dm-zoned device mapper target exposes a zoned block device as a regular block device.</li><li><a title="Device Mapper - ZonedStorage.io" rel="nofollow" href="https://zonedstorage.io/linux/dm/#dm-zoned">Device Mapper - ZonedStorage.io</a></li><li><a title=" What are PMR and SMR hard disk drives?" rel="nofollow" href="https://www.synology.com/en-us/knowledgebase/DSM/tutorial/Storage/PMR_SMR_hard_disk_drives"> What are PMR and SMR hard disk drives?</a></li><li><a title="Beware of SMR drives in PMR clothing" rel="nofollow" href="https://zfsonlinux.topicbox.com/groups/zfs-discuss/T759a10612888a9d9-Me469c98023e1a2cb059f9391/beware-of-smr-drives-in-pmr-clothing">Beware of SMR drives in PMR clothing</a> &mdash; WD and Seagate are both submarining Drive-managed SMR (DM-SMR) drives into channels, disguised as "normal" drives.</li><li><a title="Beware of SMR drives in PMR clothing [Reddit]" rel="nofollow" href="https://www.reddit.com/r/zfs/comments/frsic7/beware_of_smr_drives_in_pmr_clothing/">Beware of SMR drives in PMR clothing [Reddit]</a></li><li><a title="The exFAT filesystem is coming to Linux—Paragon software’s not happy about it" rel="nofollow" href="https://arstechnica.com/information-technology/2020/03/the-exfat-filesystem-is-coming-to-linux-paragon-softwares-not-happy-about-it/">The exFAT filesystem is coming to Linux—Paragon software’s not happy about it</a> &mdash; When software and operating system giant Microsoft announced its support for inclusion of the exFAT filesystem directly into the Linux kernel back in August, it didn't get a ton of press coverage. But filesystem vendor Paragon Software clearly noticed this month's merge of the Microsoft-approved, largely Samsung-authored version of exFAT into the VFS for-next repository, which will in turn merge into Linux 5.7—and Paragon doesn't seem happy about it.</li><li><a title="The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=New-exFAT-For-Linux-5.7">The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7</a></li><li><a title="Speeding up Linux disk encryption - The Cloudflare Blog" rel="nofollow" href="https://blog.cloudflare.com/speeding-up-linux-disk-encryption/">Speeding up Linux disk encryption - The Cloudflare Blog</a> &mdash; Encrypting data at rest is vital for Cloudflare with more than 200 data centres across the world. In this post, we will investigate the performance of disk encryption on Linux and explain how we made it at least two times faster for ourselves and our customers.</li><li><a title="Add inline dm-crypt patch and xtsproxy Crypto API patch" rel="nofollow" href="https://github.com/cloudflare/linux/blob/master/patches/0023-Add-DM_CRYPT_FORCE_INLINE-flag-to-dm-crypt-target.patch">Add inline dm-crypt patch and xtsproxy Crypto API patch</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at Cloudflare&#39;s impressive Linux disk encryption speed-ups, and explore how zoned storage tools like dm-zoned and zonefs might help mitigate the downsides of Shingled Magnetic Recording.  </p>

<p>Plus we celebrate WireGuard&#39;s inclusion in the Linux 5.6 kernel, and fight some exFAT FUD.</p><p>Links:</p><ul><li><a title="WireGuard VPN makes it to 1.0.0—and into the next Linux kernel" rel="nofollow" href="https://arstechnica.com/gadgets/2020/03/wireguard-vpn-makes-it-to-1-0-0-and-into-the-next-linux-kernel/">WireGuard VPN makes it to 1.0.0—and into the next Linux kernel</a> &mdash; It's a good day for WireGuard users—DKMS builds will soon be behind us.
</li><li><a title="Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=linux-56-features&amp;num=1">Linux 5.6 Is The Most Exciting Kernel In Years With So Many New Features</a></li><li><a title="fs: New zonefs file system" rel="nofollow" href="https://lwn.net/Articles/793585/">fs: New zonefs file system</a> &mdash; zonefs is a very simple file system exposing each zone of a zoned block device as a file. This is intended to simplify implementation of application zoned block device raw access support by allowing switching to the well known POSIX file API rather than relying on direct block device file ioctls and read/write.</li><li><a title="Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6" rel="nofollow" href="https://blog.westerndigital.com/zonefs-file-system-linux-5-6/">Ama-ZNS! Zonefs File-System Will Land with Linux® 5.6</a></li><li><a title="What is Zoned Storage and the Zoned Storage Initiative?" rel="nofollow" href="https://blog.westerndigital.com/what-is-zoned-storage-initiative/">What is Zoned Storage and the Zoned Storage Initiative?</a> &mdash; Zoned Storage is a new paradigm in storage motivated by the incredible explosion of data. Our data-driven society is increasingly dependent on data for every-day life and extreme scale data management is becoming a necessity. </li><li><a title="Linux Kernel Support - ZonedStorage.io" rel="nofollow" href="https://www.zonedstorage.io/introduction/linux-support/">Linux Kernel Support - ZonedStorage.io</a></li><li><a title="dm-zoned" rel="nofollow" href="https://www.kernel.org/doc/html/latest/admin-guide/device-mapper/dm-zoned.html">dm-zoned</a> &mdash; The dm-zoned device mapper target exposes a zoned block device as a regular block device.</li><li><a title="Device Mapper - ZonedStorage.io" rel="nofollow" href="https://zonedstorage.io/linux/dm/#dm-zoned">Device Mapper - ZonedStorage.io</a></li><li><a title=" What are PMR and SMR hard disk drives?" rel="nofollow" href="https://www.synology.com/en-us/knowledgebase/DSM/tutorial/Storage/PMR_SMR_hard_disk_drives"> What are PMR and SMR hard disk drives?</a></li><li><a title="Beware of SMR drives in PMR clothing" rel="nofollow" href="https://zfsonlinux.topicbox.com/groups/zfs-discuss/T759a10612888a9d9-Me469c98023e1a2cb059f9391/beware-of-smr-drives-in-pmr-clothing">Beware of SMR drives in PMR clothing</a> &mdash; WD and Seagate are both submarining Drive-managed SMR (DM-SMR) drives into channels, disguised as "normal" drives.</li><li><a title="Beware of SMR drives in PMR clothing [Reddit]" rel="nofollow" href="https://www.reddit.com/r/zfs/comments/frsic7/beware_of_smr_drives_in_pmr_clothing/">Beware of SMR drives in PMR clothing [Reddit]</a></li><li><a title="The exFAT filesystem is coming to Linux—Paragon software’s not happy about it" rel="nofollow" href="https://arstechnica.com/information-technology/2020/03/the-exfat-filesystem-is-coming-to-linux-paragon-softwares-not-happy-about-it/">The exFAT filesystem is coming to Linux—Paragon software’s not happy about it</a> &mdash; When software and operating system giant Microsoft announced its support for inclusion of the exFAT filesystem directly into the Linux kernel back in August, it didn't get a ton of press coverage. But filesystem vendor Paragon Software clearly noticed this month's merge of the Microsoft-approved, largely Samsung-authored version of exFAT into the VFS for-next repository, which will in turn merge into Linux 5.7—and Paragon doesn't seem happy about it.</li><li><a title="The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=New-exFAT-For-Linux-5.7">The New Microsoft exFAT File-System Driver Is Set To Land With Linux 5.7</a></li><li><a title="Speeding up Linux disk encryption - The Cloudflare Blog" rel="nofollow" href="https://blog.cloudflare.com/speeding-up-linux-disk-encryption/">Speeding up Linux disk encryption - The Cloudflare Blog</a> &mdash; Encrypting data at rest is vital for Cloudflare with more than 200 data centres across the world. In this post, we will investigate the performance of disk encryption on Linux and explain how we made it at least two times faster for ourselves and our customers.</li><li><a title="Add inline dm-crypt patch and xtsproxy Crypto API patch" rel="nofollow" href="https://github.com/cloudflare/linux/blob/master/patches/0023-Add-DM_CRYPT_FORCE_INLINE-flag-to-dm-crypt-target.patch">Add inline dm-crypt patch and xtsproxy Crypto API patch</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>422: Multipath Musings</title>
  <link>https://techsnap.systems/422</link>
  <guid isPermaLink="false">7c9cef4d-3995-411c-9613-8e74e8156f5a</guid>
  <pubDate>Fri, 07 Feb 2020 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/7c9cef4d-3995-411c-9613-8e74e8156f5a.mp3" length="17013783" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP.</itunes:subtitle>
  <itunes:duration>23:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. 
Plus the latest Intel speculative execution vulnerability, and Microsoft's troubled history with certificate renewal. 
</description>
  <itunes:keywords>Automation, Let's Encrypt, SSL, TLS, CacheOut, Microsoft, Teams, Nagios, Monitoring, Linux, WireGuard, VPN, Edge, Edgium, browser wars, Chrome, blink, Chromium, Firefox, open standards, world wide web, Linux 5.6, Ubuntu 20.04, poly1305, Jason Donenfeld, networking, crypto, cryptography, mptcp, Multipath TCP, iOS, Apple, mobile, LTE, 5G, failover, 3GPP, Intel, speculative execution, ZombieLoad, TSX, SGX, cloud, virtualization, buffer overflow, stack smashing, stack canary, ASLR, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. </p>

<p>Plus the latest Intel speculative execution vulnerability, and Microsoft&#39;s troubled history with certificate renewal.</p><p>Links:</p><ul><li><a title="Oregon company makes top bid for Microsoft check - CNET" rel="nofollow" href="https://www.cnet.com/news/oregon-company-makes-top-bid-for-microsoft-check/">Oregon company makes top bid for Microsoft check - CNET</a></li><li><a title="Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/yesterdays-multi-hour-teams-outage-was-due-to-an-expired-ssl-certificate/">Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica</a></li><li><a title="Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge" rel="nofollow" href="https://www.theverge.com/2020/2/3/21120248/microsoft-teams-down-outage-certificate-issue-status">Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge</a></li><li><a title="Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/browser-review-microsofts-new-edgium-chromium-based-edge/">Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica</a></li><li><a title="Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/linus-torvalds-pulled-wireguard-vpn-into-the-5-6-kernel-source-tree/">Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica</a></li><li><a title="Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Ubuntu-20.04-Adds-WireGuard">Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix</a></li><li><a title="Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Starts-Multipath-TCP">Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix</a></li><li><a title="MultiPath TCP - Linux Kernel implementation" rel="nofollow" href="https://www.multipath-tcp.org/">MultiPath TCP - Linux Kernel implementation</a></li><li><a title="Upstreaming multipath TCP" rel="nofollow" href="https://lwn.net/Articles/800501/">Upstreaming multipath TCP</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=Y64n_R14GtI">LPC2019 - Multipath TCP Upstreaming - YouTube</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Slides" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/247/438/LPC2019-Upstreaming-MPTCP-slides.pdf">LPC2019 - Multipath TCP Upstreaming - Slides</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Paper" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/246/428/LPC2019-Upstreaming-MPTCP-paper.pdf">LPC2019 - Multipath TCP Upstreaming - Paper</a></li><li><a title="Using MultiPath TCP to enhance home networks" rel="nofollow" href="https://www.sajalkayan.com/post/fun-with-mptcp.html">Using MultiPath TCP to enhance home networks</a></li><li><a title="Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Crypto-AVX-Poly1305">Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305</a></li><li><a title="Poly1305" rel="nofollow" href="https://en.wikipedia.org/wiki/Poly1305">Poly1305</a></li><li><a title="CacheOut" rel="nofollow" href="https://cacheoutattack.com/">CacheOut</a></li><li><a title="CacheOut Paper" rel="nofollow" href="https://cacheoutattack.com/CacheOut.pdf">CacheOut Paper</a></li><li><a title="Intel Responds to ZombieLoad and CacheOut Attacks | Tom&#39;s Hardware" rel="nofollow" href="https://www.tomshardware.com/news/intel-responds-to-zombieload-and-cacheout-attacks">Intel Responds to ZombieLoad and CacheOut Attacks | Tom's Hardware</a></li><li><a title="New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave" rel="nofollow" href="https://hothardware.com/news/cacheout-attack-intel-cpus-leaks-data-vms-secure-enclave">New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We take a look at a few exciting features coming to Linux kernel 5.6, including the first steps to multipath TCP. </p>

<p>Plus the latest Intel speculative execution vulnerability, and Microsoft&#39;s troubled history with certificate renewal.</p><p>Links:</p><ul><li><a title="Oregon company makes top bid for Microsoft check - CNET" rel="nofollow" href="https://www.cnet.com/news/oregon-company-makes-top-bid-for-microsoft-check/">Oregon company makes top bid for Microsoft check - CNET</a></li><li><a title="Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/02/yesterdays-multi-hour-teams-outage-was-due-to-an-expired-ssl-certificate/">Microsoft’s failures to renew: Teams, Hotmail, and Hotmail.co.uk | Ars Technica</a></li><li><a title="Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge" rel="nofollow" href="https://www.theverge.com/2020/2/3/21120248/microsoft-teams-down-outage-certificate-issue-status">Microsoft Teams goes down after Microsoft forgot to renew a certificate - The Verge</a></li><li><a title="Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/browser-review-microsofts-new-edgium-chromium-based-edge/">Browser review: Microsoft’s new “Edgium” Chromium-based Edge | Ars Technica</a></li><li><a title="Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/01/linus-torvalds-pulled-wireguard-vpn-into-the-5-6-kernel-source-tree/">Linus Torvalds pulled WireGuard VPN into the 5.6 kernel source tree | Ars Technica</a></li><li><a title="Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Ubuntu-20.04-Adds-WireGuard">Ubuntu 20.04 LTS Adds WireGuard Support - Phoronix</a></li><li><a title="Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Starts-Multipath-TCP">Multipath TCP Support Is Working Its Upstream - First Bits Landing With Linux 5.6 - Phoronix</a></li><li><a title="MultiPath TCP - Linux Kernel implementation" rel="nofollow" href="https://www.multipath-tcp.org/">MultiPath TCP - Linux Kernel implementation</a></li><li><a title="Upstreaming multipath TCP" rel="nofollow" href="https://lwn.net/Articles/800501/">Upstreaming multipath TCP</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=Y64n_R14GtI">LPC2019 - Multipath TCP Upstreaming - YouTube</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Slides" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/247/438/LPC2019-Upstreaming-MPTCP-slides.pdf">LPC2019 - Multipath TCP Upstreaming - Slides</a></li><li><a title="LPC2019 - Multipath TCP Upstreaming - Paper" rel="nofollow" href="https://linuxplumbersconf.org/event/4/contributions/435/attachments/246/428/LPC2019-Upstreaming-MPTCP-paper.pdf">LPC2019 - Multipath TCP Upstreaming - Paper</a></li><li><a title="Using MultiPath TCP to enhance home networks" rel="nofollow" href="https://www.sajalkayan.com/post/fun-with-mptcp.html">Using MultiPath TCP to enhance home networks</a></li><li><a title="Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-5.6-Crypto-AVX-Poly1305">Linux 5.6 Crypto Getting AVX/AVX2/AVX-512 Optimized Poly1305</a></li><li><a title="Poly1305" rel="nofollow" href="https://en.wikipedia.org/wiki/Poly1305">Poly1305</a></li><li><a title="CacheOut" rel="nofollow" href="https://cacheoutattack.com/">CacheOut</a></li><li><a title="CacheOut Paper" rel="nofollow" href="https://cacheoutattack.com/CacheOut.pdf">CacheOut Paper</a></li><li><a title="Intel Responds to ZombieLoad and CacheOut Attacks | Tom&#39;s Hardware" rel="nofollow" href="https://www.tomshardware.com/news/intel-responds-to-zombieload-and-cacheout-attacks">Intel Responds to ZombieLoad and CacheOut Attacks | Tom's Hardware</a></li><li><a title="New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave" rel="nofollow" href="https://hothardware.com/news/cacheout-attack-intel-cpus-leaks-data-vms-secure-enclave">New CacheOut Attack Targets Intel CPUs, Leaks Data From VMs And Secure Enclave</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>421: Firewall Fun</title>
  <link>https://techsnap.systems/421</link>
  <guid isPermaLink="false">34f7722c-c7da-4f86-a8f9-14e67de6d899</guid>
  <pubDate>Fri, 24 Jan 2020 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/34f7722c-c7da-4f86-a8f9-14e67de6d899.mp3" length="18463600" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. </itunes:subtitle>
  <itunes:duration>25:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. 
Plus a look back at Apollo-era audio that's still relevant today with the surprising story of the Quindar tones. 
</description>
  <itunes:keywords>Windows, Windows Update, Patch Tuesday, Microsoft, cryptography, EternalBlue, crypt32.dll, CryptoAPI spoofing, RDP, RDP Gateway, RDP client, NSA, National Security Administration, patching, security, vulnerability, ECC, elliptic curve cryptography, Windows 10, certificate validation, OPNsense, pfSense, pf, BSD, iptables, Linux, Netgate, Netgear, networking, routing, security gateway, firewall appliance, x86, ARM, Unix, MITM, VPN, firewall, CVE-2020-0601, NASA, Apollo, moon, space, Quindar, Quindar Tones, phreaking, telephony, hacking, Captain Crunch whistle, 2600, nmap, Crystal Method, John Draper, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, Linux Academy, sysadmin podcast, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. </p>

<p>Plus a look back at Apollo-era audio that&#39;s still relevant today with the surprising story of the Quindar tones.</p><p>Links:</p><ul><li><a title="Critical Vulnerabilities in Microsoft Windows Operating Systems" rel="nofollow" href="https://www.us-cert.gov/ncas/alerts/aa20-014a">Critical Vulnerabilities in Microsoft Windows Operating Systems</a></li><li><a title="Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2" rel="nofollow" href="https://medium.com/zengo/win10-crypto-vulnerability-cheating-in-elliptic-curve-billiards-2-69b45f2dcab6">Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2</a></li><li><a title="NSA discovers a serious flaw in Windows 10" rel="nofollow" href="https://betanews.com/2020/01/14/nsa-discovers-a-serious-flaw-in-windows-10/">NSA discovers a serious flaw in Windows 10</a></li><li><a title="Exploiting CVE-2020-0601" rel="nofollow" href="https://blog.sean-wright.com/exploiting-cve-2020-0601/">Exploiting CVE-2020-0601</a></li><li><a title="CVE-2020-0601 POC" rel="nofollow" href="https://github.com/ollypwn/cve-2020-0601">CVE-2020-0601 POC</a></li><li><a title="NSA Cybersecurity Advisory on CryptoAPI Flaw" rel="nofollow" href="https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF">NSA Cybersecurity Advisory on CryptoAPI Flaw</a></li><li><a title="Why can’t I get to the internet on my new OPNsense install?! - Jim&#39;s Blog" rel="nofollow" href="https://jrs-s.net/2020/01/19/why-cant-i-get-to-the-internet-on-my-new-opnsense-install/">Why can’t I get to the internet on my new OPNsense install?! - Jim's Blog</a></li><li><a title="OPNsense: a true open source security platform and more" rel="nofollow" href="https://opnsense.org">OPNsense: a true open source security platform and more</a></li><li><a title="There&#39;s An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space" rel="nofollow" href="https://jalopnik.com/theres-an-actual-name-and-reason-for-those-beeps-you-he-1841024797">There's An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space</a></li><li><a title="Quindar Tones" rel="nofollow" href="https://www.hq.nasa.gov/alsj/quindar.html">Quindar Tones</a></li><li><a title="Cap&#39;n Crunch Whistle and the Secrets of the Little Blue Box" rel="nofollow" href="https://telephone-museum.org/telephone-collections/capn-crunch-bosun-whistle/">Cap'n Crunch Whistle and the Secrets of the Little Blue Box</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explore the latest round of Windows vulnerabilities and Jim shares his journey adding OPNsense to his firewall family. </p>

<p>Plus a look back at Apollo-era audio that&#39;s still relevant today with the surprising story of the Quindar tones.</p><p>Links:</p><ul><li><a title="Critical Vulnerabilities in Microsoft Windows Operating Systems" rel="nofollow" href="https://www.us-cert.gov/ncas/alerts/aa20-014a">Critical Vulnerabilities in Microsoft Windows Operating Systems</a></li><li><a title="Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2" rel="nofollow" href="https://medium.com/zengo/win10-crypto-vulnerability-cheating-in-elliptic-curve-billiards-2-69b45f2dcab6">Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2</a></li><li><a title="NSA discovers a serious flaw in Windows 10" rel="nofollow" href="https://betanews.com/2020/01/14/nsa-discovers-a-serious-flaw-in-windows-10/">NSA discovers a serious flaw in Windows 10</a></li><li><a title="Exploiting CVE-2020-0601" rel="nofollow" href="https://blog.sean-wright.com/exploiting-cve-2020-0601/">Exploiting CVE-2020-0601</a></li><li><a title="CVE-2020-0601 POC" rel="nofollow" href="https://github.com/ollypwn/cve-2020-0601">CVE-2020-0601 POC</a></li><li><a title="NSA Cybersecurity Advisory on CryptoAPI Flaw" rel="nofollow" href="https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF">NSA Cybersecurity Advisory on CryptoAPI Flaw</a></li><li><a title="Why can’t I get to the internet on my new OPNsense install?! - Jim&#39;s Blog" rel="nofollow" href="https://jrs-s.net/2020/01/19/why-cant-i-get-to-the-internet-on-my-new-opnsense-install/">Why can’t I get to the internet on my new OPNsense install?! - Jim's Blog</a></li><li><a title="OPNsense: a true open source security platform and more" rel="nofollow" href="https://opnsense.org">OPNsense: a true open source security platform and more</a></li><li><a title="There&#39;s An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space" rel="nofollow" href="https://jalopnik.com/theres-an-actual-name-and-reason-for-those-beeps-you-he-1841024797">There's An Actual Name And Reason For Those Beeps You Hear In Recordings Of Astronauts In Space</a></li><li><a title="Quindar Tones" rel="nofollow" href="https://www.hq.nasa.gov/alsj/quindar.html">Quindar Tones</a></li><li><a title="Cap&#39;n Crunch Whistle and the Secrets of the Little Blue Box" rel="nofollow" href="https://telephone-museum.org/telephone-collections/capn-crunch-bosun-whistle/">Cap'n Crunch Whistle and the Secrets of the Little Blue Box</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>420: Choose Your Own Compiler</title>
  <link>https://techsnap.systems/420</link>
  <guid isPermaLink="false">00154604-0b9c-480c-9fe2-2fba4ed8420a</guid>
  <pubDate>Fri, 10 Jan 2020 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/00154604-0b9c-480c-9fe2-2fba4ed8420a.mp3" length="17409694" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem.</itunes:subtitle>
  <itunes:duration>24:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem.
Plus Debian's continued init system debate, and our frustrations over 5G reporting. 
</description>
  <itunes:keywords>5G, Telephony, mobile, cell phones, LTE, 4G, wireless, broadband, South Korea, FR1, FR2, mmWave, Debian, systemd, netplan, Ubuntu, Canonical, Unity, networking, init system, systemd-networkd, Phoronix, Michael Larabel, clang, LLVM, GCC, GNU, compilers, C, systems programming, linux, linux kernel, kernel development, DevOps, TechSNAP, Jupiter Broadcasting,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem.</p>

<p>Plus Debian&#39;s continued init system debate, and our frustrations over 5G reporting.</p><p>Links:</p><ul><li><a title="5G Underwhelms in Its First Big Test - WSJ" rel="nofollow" href="https://www.wsj.com/articles/5g-underwhelms-in-its-first-big-test-11577788203">5G Underwhelms in Its First Big Test - WSJ</a></li><li><a title="How South Korea built 5G, and what it&#39;s learning - RCR Wireless News" rel="nofollow" href="https://www.rcrwireless.com/20190912/5g/how-south-korea-built-5g-and-what-its-learning">How South Korea built 5G, and what it's learning - RCR Wireless News</a></li><li><a title="After seven months, here’s what South Korea can teach us about 5G - CNA" rel="nofollow" href="https://www.channelnewsasia.com/news/cnainsider/what-south-korea-first-country-launch-5g-network-can-teach-us-12056726">After seven months, here’s what South Korea can teach us about 5G - CNA</a></li><li><a title="South Korea secures 4 million 5G subscribers | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/south-korea-secures-4-million-5g-subscribers/">South Korea secures 4 million 5G subscribers | ZDNet</a></li><li><a title="Debian Developers Take To Voting Over Init System Diversity" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Debian-Init-Diversity-Vote">Debian Developers Take To Voting Over Init System Diversity</a></li><li><a title="Debian GR Results" rel="nofollow" href="https://vote.debian.org/~secretary/gr_initsystems/results.txt">Debian GR Results</a></li><li><a title="General Resolution: Init systems and systemd" rel="nofollow" href="https://www.debian.org/vote/2019/vote_002">General Resolution: Init systems and systemd</a></li><li><a title="Ringing In 2020 By Clang’ing The Linux 5.5 Kernel - Benchmarks Of GCC vs. Clang Built Kernels" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=linux-55-clang&amp;num=1">Ringing In 2020 By Clang’ing The Linux 5.5 Kernel - Benchmarks Of GCC vs. Clang Built Kernels</a></li><li><a title="Using LLVM Clang To Compile The Linux Kernel Is Heating Up Again Thanks To Google" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Google-2019-Clang-Kernel">Using LLVM Clang To Compile The Linux Kernel Is Heating Up Again Thanks To Google</a></li><li><a title="Building the kernel with Clang - LWN" rel="nofollow" href="https://lwn.net/Articles/734071/">Building the kernel with Clang - LWN</a></li><li><a title="ClangBuiltLinux" rel="nofollow" href="https://clangbuiltlinux.github.io">ClangBuiltLinux</a></li><li><a title="Compiling the Linux kernel with LLVM tools (FOSDEM 2019)" rel="nofollow" href="https://archive.fosdem.org/2019/schedule/event/llvm_kernel/">Compiling the Linux kernel with LLVM tools (FOSDEM 2019)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Compiling the Linux kernel with Clang has never been easier, so we explore this alternative compiler and what it brings to the ecosystem.</p>

<p>Plus Debian&#39;s continued init system debate, and our frustrations over 5G reporting.</p><p>Links:</p><ul><li><a title="5G Underwhelms in Its First Big Test - WSJ" rel="nofollow" href="https://www.wsj.com/articles/5g-underwhelms-in-its-first-big-test-11577788203">5G Underwhelms in Its First Big Test - WSJ</a></li><li><a title="How South Korea built 5G, and what it&#39;s learning - RCR Wireless News" rel="nofollow" href="https://www.rcrwireless.com/20190912/5g/how-south-korea-built-5g-and-what-its-learning">How South Korea built 5G, and what it's learning - RCR Wireless News</a></li><li><a title="After seven months, here’s what South Korea can teach us about 5G - CNA" rel="nofollow" href="https://www.channelnewsasia.com/news/cnainsider/what-south-korea-first-country-launch-5g-network-can-teach-us-12056726">After seven months, here’s what South Korea can teach us about 5G - CNA</a></li><li><a title="South Korea secures 4 million 5G subscribers | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/south-korea-secures-4-million-5g-subscribers/">South Korea secures 4 million 5G subscribers | ZDNet</a></li><li><a title="Debian Developers Take To Voting Over Init System Diversity" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Debian-Init-Diversity-Vote">Debian Developers Take To Voting Over Init System Diversity</a></li><li><a title="Debian GR Results" rel="nofollow" href="https://vote.debian.org/~secretary/gr_initsystems/results.txt">Debian GR Results</a></li><li><a title="General Resolution: Init systems and systemd" rel="nofollow" href="https://www.debian.org/vote/2019/vote_002">General Resolution: Init systems and systemd</a></li><li><a title="Ringing In 2020 By Clang’ing The Linux 5.5 Kernel - Benchmarks Of GCC vs. Clang Built Kernels" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=linux-55-clang&amp;num=1">Ringing In 2020 By Clang’ing The Linux 5.5 Kernel - Benchmarks Of GCC vs. Clang Built Kernels</a></li><li><a title="Using LLVM Clang To Compile The Linux Kernel Is Heating Up Again Thanks To Google" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Google-2019-Clang-Kernel">Using LLVM Clang To Compile The Linux Kernel Is Heating Up Again Thanks To Google</a></li><li><a title="Building the kernel with Clang - LWN" rel="nofollow" href="https://lwn.net/Articles/734071/">Building the kernel with Clang - LWN</a></li><li><a title="ClangBuiltLinux" rel="nofollow" href="https://clangbuiltlinux.github.io">ClangBuiltLinux</a></li><li><a title="Compiling the Linux kernel with LLVM tools (FOSDEM 2019)" rel="nofollow" href="https://archive.fosdem.org/2019/schedule/event/llvm_kernel/">Compiling the Linux kernel with LLVM tools (FOSDEM 2019)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>419: Nebulous Networking</title>
  <link>https://techsnap.systems/419</link>
  <guid isPermaLink="false">9a06579c-89cb-4562-a2bc-09199c6790f5</guid>
  <pubDate>Fri, 27 Dec 2019 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/9a06579c-89cb-4562-a2bc-09199c6790f5.mp3" length="24506008" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.</itunes:subtitle>
  <itunes:duration>33:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network. 
</description>
  <itunes:keywords>VPN,Nebula, Slack, Ryan Huber, WireGuard,mesh network,mesh VPN,mesh networking,networking,security,security groups,UDP, AT,NAT busting,UDP hole-punching,cloud,system administration,firewall, lighthouse, encryption, Noise Protocol Framework, cryptography, overlay network, flat network, virtual network, DeOldify,Jupyter notebook, Machine Learning, Artificial Intelligence, neural networks, Plinko, pachinko, ImageNet,  GPU, Google Colab, Colab, DevOps, TechSNAP, Jupiter Broadcasting,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.</p><p>Links:</p><ul><li><a title="Introducing Nebula, the open source global overlay network from Slack" rel="nofollow" href="https://slack.engineering/introducing-nebula-the-open-source-global-overlay-network-from-slack-884110a5579">Introducing Nebula, the open source global overlay network from Slack</a></li><li><a title="nebula: A scalable overlay networking tool with a focus on performance, simplicity and security" rel="nofollow" href="https://github.com/slackhq/nebula">nebula: A scalable overlay networking tool with a focus on performance, simplicity and security</a></li><li><a title="Nebula VPN routes between hosts privately, flexibly, and efficiently" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/nebula-vpn-routes-between-hosts-privately-flexibly-and-efficiently/">Nebula VPN routes between hosts privately, flexibly, and efficiently</a></li><li><a title="How to set up your own Nebula mesh VPN, step by step" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/how-to-set-up-your-own-nebula-mesh-vpn-step-by-step/">How to set up your own Nebula mesh VPN, step by step</a></li><li><a title="LINUX Unplugged 329: Flat Network Truthers" rel="nofollow" href="https://linuxunplugged.com/329">LINUX Unplugged 329: Flat Network Truthers</a></li><li><a title="Cloudy with a chance of neurons: The tools that make neural networks work" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/so-you-want-to-build-a-neural-network-the-cloud-can-help-with-that/">Cloudy with a chance of neurons: The tools that make neural networks work</a></li><li><a title="Welcome To Colaboratory" rel="nofollow" href="https://colab.research.google.com/notebooks/welcome.ipynb">Welcome To Colaboratory</a></li><li><a title="ImageColorizer Notebook" rel="nofollow" href="https://colab.research.google.com/github/jantic/DeOldify/blob/master/ImageColorizerColab.ipynb">ImageColorizer Notebook</a></li><li><a title="DeOldify: A Deep Learning based project for colorizing and restoring old images (and video!)" rel="nofollow" href="https://github.com/jantic/DeOldify">DeOldify: A Deep Learning based project for colorizing and restoring old images (and video!)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>From classifying cats to colorizing old photos we share our top tips and tools for starting your machine learning journey. Plus, learn why Nebula is our favorite new VPN technology, and how it can help simplify and secure your network.</p><p>Links:</p><ul><li><a title="Introducing Nebula, the open source global overlay network from Slack" rel="nofollow" href="https://slack.engineering/introducing-nebula-the-open-source-global-overlay-network-from-slack-884110a5579">Introducing Nebula, the open source global overlay network from Slack</a></li><li><a title="nebula: A scalable overlay networking tool with a focus on performance, simplicity and security" rel="nofollow" href="https://github.com/slackhq/nebula">nebula: A scalable overlay networking tool with a focus on performance, simplicity and security</a></li><li><a title="Nebula VPN routes between hosts privately, flexibly, and efficiently" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/nebula-vpn-routes-between-hosts-privately-flexibly-and-efficiently/">Nebula VPN routes between hosts privately, flexibly, and efficiently</a></li><li><a title="How to set up your own Nebula mesh VPN, step by step" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/how-to-set-up-your-own-nebula-mesh-vpn-step-by-step/">How to set up your own Nebula mesh VPN, step by step</a></li><li><a title="LINUX Unplugged 329: Flat Network Truthers" rel="nofollow" href="https://linuxunplugged.com/329">LINUX Unplugged 329: Flat Network Truthers</a></li><li><a title="Cloudy with a chance of neurons: The tools that make neural networks work" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/so-you-want-to-build-a-neural-network-the-cloud-can-help-with-that/">Cloudy with a chance of neurons: The tools that make neural networks work</a></li><li><a title="Welcome To Colaboratory" rel="nofollow" href="https://colab.research.google.com/notebooks/welcome.ipynb">Welcome To Colaboratory</a></li><li><a title="ImageColorizer Notebook" rel="nofollow" href="https://colab.research.google.com/github/jantic/DeOldify/blob/master/ImageColorizerColab.ipynb">ImageColorizer Notebook</a></li><li><a title="DeOldify: A Deep Learning based project for colorizing and restoring old images (and video!)" rel="nofollow" href="https://github.com/jantic/DeOldify">DeOldify: A Deep Learning based project for colorizing and restoring old images (and video!)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>418: 5G Fundamentals</title>
  <link>https://techsnap.systems/418</link>
  <guid isPermaLink="false">2af0a57c-a88d-4aaa-9998-2b77110900c4</guid>
  <pubDate>Fri, 13 Dec 2019 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/2af0a57c-a88d-4aaa-9998-2b77110900c4.mp3" length="24524196" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>As the rollout of 5G finally arrives, we take some time to explain the fundamentals of the next generation of wireless technology.</itunes:subtitle>
  <itunes:duration>34:03</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>As the rollout of 5G finally arrives, we take some time to explain the fundamentals of the next generation of wireless technology.
Plus the surprising performance of eero's mesh Wi-Fi, some great news for WireGuard, and an update on the Librem 5. 
</description>
  <itunes:keywords>T-Mobile, AT&amp;T, Cellular, Mobile, LTE, mobile phones, IoT, 5G, 4G, wireless, broadband, 5G FR2, 5G FR1, point-to-point,  Qualcomm, Snapdragon 865, mobile CPU, ARM, cellular modems, wireless modems, Librem 5, Purism, smartphone, freedom, libre, free software, privacy, security, Amazon, eero, mesh wifi, wifi, Wi-Fi, networking, wireless, speed test, DevOps, TechSNAP, Jupiter Broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>As the rollout of 5G finally arrives, we take some time to explain the fundamentals of the next generation of wireless technology.</p>

<p>Plus the surprising performance of eero&#39;s mesh Wi-Fi, some great news for WireGuard, and an update on the Librem 5.</p><p>Links:</p><ul><li><a title="T-Mobile launches 600MHz 5G across the US, but no one can use it yet" rel="nofollow" href="https://www.theverge.com/2019/12/2/20991566/tmobile-nationwide-5g-600mhz-launch-samsung-oneplus">T-Mobile launches 600MHz 5G across the US, but no one can use it yet</a></li><li><a title="Study confirms AT&amp;T’s fake 5G E network is no faster than Verizon, T-Mobile or Sprint 4G" rel="nofollow" href="https://www.theverge.com/2019/3/22/18277484/att-fake-5g-e-network-lte-study">Study confirms AT&amp;T’s fake 5G E network is no faster than Verizon, T-Mobile or Sprint 4G</a></li><li><a title="5G on the horizon: Here’s what it is and what’s coming" rel="nofollow" href="https://arstechnica.com/information-technology/2019/12/5g-wont-change-everything-or-at-least-probably-not-your-things/">5G on the horizon: Here’s what it is and what’s coming</a></li><li><a title="Can 5G replace everybody’s home broadband?" rel="nofollow" href="https://arstechnica.com/information-technology/2019/12/5g-as-a-home-broadband-replacement-isnt-a-slam-dunk-yet-but-it-might-be-soon/">Can 5G replace everybody’s home broadband?</a></li><li><a title="The Snapdragon 865 will make phones worse in 2020, thanks to mandatory 5G" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/qualcomms-new-snapdragon-865-is-a-step-backwards-for-smartphone-design/">The Snapdragon 865 will make phones worse in 2020, thanks to mandatory 5G</a></li><li><a title="Librem 5 backers have begun receiving their Linux phones" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/librem-5-backers-receiving-their-linux-phones/">Librem 5 backers have begun receiving their Linux phones</a></li><li><a title="Amazon’s inexpensive Eero mesh Wi-Fi kit is shockingly good" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/amazons-inexpensive-eero-mesh-wi-fi-kit-is-shockingly-good/">Amazon’s inexpensive Eero mesh Wi-Fi kit is shockingly good</a></li><li><a title="WireGuard VPN is a step closer to mainstream adoption" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/wireguard-vpn-is-a-step-closer-to-mainstream-adoption/">WireGuard VPN is a step closer to mainstream adoption</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>As the rollout of 5G finally arrives, we take some time to explain the fundamentals of the next generation of wireless technology.</p>

<p>Plus the surprising performance of eero&#39;s mesh Wi-Fi, some great news for WireGuard, and an update on the Librem 5.</p><p>Links:</p><ul><li><a title="T-Mobile launches 600MHz 5G across the US, but no one can use it yet" rel="nofollow" href="https://www.theverge.com/2019/12/2/20991566/tmobile-nationwide-5g-600mhz-launch-samsung-oneplus">T-Mobile launches 600MHz 5G across the US, but no one can use it yet</a></li><li><a title="Study confirms AT&amp;T’s fake 5G E network is no faster than Verizon, T-Mobile or Sprint 4G" rel="nofollow" href="https://www.theverge.com/2019/3/22/18277484/att-fake-5g-e-network-lte-study">Study confirms AT&amp;T’s fake 5G E network is no faster than Verizon, T-Mobile or Sprint 4G</a></li><li><a title="5G on the horizon: Here’s what it is and what’s coming" rel="nofollow" href="https://arstechnica.com/information-technology/2019/12/5g-wont-change-everything-or-at-least-probably-not-your-things/">5G on the horizon: Here’s what it is and what’s coming</a></li><li><a title="Can 5G replace everybody’s home broadband?" rel="nofollow" href="https://arstechnica.com/information-technology/2019/12/5g-as-a-home-broadband-replacement-isnt-a-slam-dunk-yet-but-it-might-be-soon/">Can 5G replace everybody’s home broadband?</a></li><li><a title="The Snapdragon 865 will make phones worse in 2020, thanks to mandatory 5G" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/qualcomms-new-snapdragon-865-is-a-step-backwards-for-smartphone-design/">The Snapdragon 865 will make phones worse in 2020, thanks to mandatory 5G</a></li><li><a title="Librem 5 backers have begun receiving their Linux phones" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/librem-5-backers-receiving-their-linux-phones/">Librem 5 backers have begun receiving their Linux phones</a></li><li><a title="Amazon’s inexpensive Eero mesh Wi-Fi kit is shockingly good" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/amazons-inexpensive-eero-mesh-wi-fi-kit-is-shockingly-good/">Amazon’s inexpensive Eero mesh Wi-Fi kit is shockingly good</a></li><li><a title="WireGuard VPN is a step closer to mainstream adoption" rel="nofollow" href="https://arstechnica.com/gadgets/2019/12/wireguard-vpn-is-a-step-closer-to-mainstream-adoption/">WireGuard VPN is a step closer to mainstream adoption</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>417: Machine Learning Magic</title>
  <link>https://techsnap.systems/417</link>
  <guid isPermaLink="false">88c620a6-0b1c-4698-aac4-ac757b632286</guid>
  <pubDate>Fri, 29 Nov 2019 00:15:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/88c620a6-0b1c-4698-aac4-ac757b632286.mp3" length="19052274" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</itunes:subtitle>
  <itunes:duration>26:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.
Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks. 
</description>
  <itunes:keywords>OFNP,wireless,wifi,On-Off Noise Power Communication,LORA,WiFi 6,Ubiquiti ,Unifi,Amplifi,Amplifi Alien,mesh wifi,router,home networking,networking,wireless,ethernet,ASUS,AiMesh,OFDMA,Orthogonal Frequency-Division Multiple Access,SmallNetBuilder,Tim Higgins,SSD,storage,IEEE,encryption,cryptography,hardware encryption,BitLocker,LUKS,DBAN,hard disk,hard drive,storage,solid state,Secure Erase,ATA,security,machine learning,AI,artificial intelligence,artificial general intelligence,training,neural network,inference,drunkard's walk,Nvidia,Tesla V100,Matrix multiplication,linear algebra,supercomputers,NPU,TPU,Google,Jeffrey Dean,CPU,GPU,Chip Design,Deep Learning,Intel AVX512,Deep Learning Boost,OpenVINO,ResNet,i9-10980XE,Arvind Narayanan,AIExpert, DevOps, TechSNAP, Jupiter Broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</p>

<p>Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks.</p><p>Links:</p><ul><li><a title="“Where the Wi-Fi sucks” is where a new wireless protocol does its magic" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/where-the-wi-fi-sucks-is-where-a-new-wireless-protocol-does-its-magic/">“Where the Wi-Fi sucks” is where a new wireless protocol does its magic</a></li><li><a title="Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/ubiquitis-new-amplifi-alien-is-a-mesh-capable-wi-fi-6-router/">Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router</a></li><li><a title="Self-encrypting deception: weaknesses in the encryption of solid state drives" rel="nofollow" href="https://www.ieee-security.org/TC/SP2019/papers/310.pdf">Self-encrypting deception: weaknesses in the encryption of solid state drives</a></li><li><a title="Securely erase a solid-state drive" rel="nofollow" href="https://kb.iu.edu/d/aiut">Securely erase a solid-state drive</a></li><li><a title="Solid state drive/Memory cell clearing - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Solid_state_drive/Memory_cell_clearing">Solid state drive/Memory cell clearing - ArchWiki</a></li><li><a title="The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design" rel="nofollow" href="https://arxiv.org/abs/1911.05289">The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design</a></li><li><a title="Intel Core i9-10980XE—a step forward for AI, a step back for everything else" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/intel-core-i9-10980xe-a-step-forward-for-ai-a-step-back-for-everything-else/">Intel Core i9-10980XE—a step forward for AI, a step back for everything else</a></li><li><a title="How to recognize AI snake oil" rel="nofollow" href="https://www.cs.princeton.edu/~arvindn/talks/MIT-STS-AI-snakeoil.pdf">How to recognize AI snake oil</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explore the rapid adoption of machine learning, its impact on computer architecture, and how to avoid AI snake oil.</p>

<p>Plus so-so SSD security, and a new wireless protocol that works best where the Wi-Fi sucks.</p><p>Links:</p><ul><li><a title="“Where the Wi-Fi sucks” is where a new wireless protocol does its magic" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/where-the-wi-fi-sucks-is-where-a-new-wireless-protocol-does-its-magic/">“Where the Wi-Fi sucks” is where a new wireless protocol does its magic</a></li><li><a title="Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/ubiquitis-new-amplifi-alien-is-a-mesh-capable-wi-fi-6-router/">Ubiquiti’s new “Amplifi Alien” is a mesh-capable Wi-Fi 6 router</a></li><li><a title="Self-encrypting deception: weaknesses in the encryption of solid state drives" rel="nofollow" href="https://www.ieee-security.org/TC/SP2019/papers/310.pdf">Self-encrypting deception: weaknesses in the encryption of solid state drives</a></li><li><a title="Securely erase a solid-state drive" rel="nofollow" href="https://kb.iu.edu/d/aiut">Securely erase a solid-state drive</a></li><li><a title="Solid state drive/Memory cell clearing - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/Solid_state_drive/Memory_cell_clearing">Solid state drive/Memory cell clearing - ArchWiki</a></li><li><a title="The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design" rel="nofollow" href="https://arxiv.org/abs/1911.05289">The Deep Learning Revolution and Its Implications for Computer Architecture and Chip Design</a></li><li><a title="Intel Core i9-10980XE—a step forward for AI, a step back for everything else" rel="nofollow" href="https://arstechnica.com/gadgets/2019/11/intel-core-i9-10980xe-a-step-forward-for-ai-a-step-back-for-everything-else/">Intel Core i9-10980XE—a step forward for AI, a step back for everything else</a></li><li><a title="How to recognize AI snake oil" rel="nofollow" href="https://www.cs.princeton.edu/~arvindn/talks/MIT-STS-AI-snakeoil.pdf">How to recognize AI snake oil</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>413: The Coffee Shop Problem</title>
  <link>https://techsnap.systems/413</link>
  <guid isPermaLink="false">2c022259-3aec-490f-b2e3-0560336bafce</guid>
  <pubDate>Fri, 04 Oct 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/2c022259-3aec-490f-b2e3-0560336bafce.mp3" length="23110449" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.
</itunes:subtitle>
  <itunes:duration>32:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.
Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release. 
</description>
  <itunes:keywords>DoH, DNS, HTTPS, TLS, SSL, DNS-over-HTTPS, Google, Mozilla, Firefox, Cloudflare, encryption, Windows, Chrome, MITM, Man-In-The-Middle, Quad-9, 1.1.1.1, 8.8.8.8, Cloudflare DNS, Google DNS, Wireguard, Wireguard VPN, VPN, WARP, privacy, anonymity, region shifting, mmproxy, tcp, tcp/ip, ip, forwarding, proxy, iptables, HTTP/3, QUIC, udp, 0-RTT, SPDY, networking, network protocol, curl, quiche, rust, chrome canary, canary, startpage, duckduckgo, google search, search engines, cookies, incognito, startmail, web proxy, Chromebook, chromebook support, lenovo, lenovo chromebook, security updates, Quantum computing, quantum computers, quantum supremacy, shor's algorithm, cryptography, public-key cryptography, AMD, AMD Ryzen, Ryzen PRO, Ryzen PRO 3000, memory encryption, devops, sysadmin podcast, jupiter broadcasting, linux academy, techsnap, guardmi</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.</p>

<p>Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release. </p><p>Links:</p><ul><li><a title="Why big ISPs aren’t happy about Google’s plans for encrypted DNS" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/09/isps-worry-a-new-chrome-feature-will-stop-them-from-spying-on-you/">Why big ISPs aren’t happy about Google’s plans for encrypted DNS</a></li><li><a title="Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade" rel="nofollow" href="https://blog.chromium.org/2019/09/experimenting-with-same-provider-dns.html">Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade</a></li><li><a title="How to enable DNS-over-HTTPS (DoH) in Google Chrome" rel="nofollow" href="https://www.zdnet.com/article/how-to-enable-dns-over-https-doh-in-google-chrome/">How to enable DNS-over-HTTPS (DoH) in Google Chrome</a></li><li><a title="What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases" rel="nofollow" href="https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/">What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases</a></li><li><a title="WARP is here" rel="nofollow" href="https://blog.cloudflare.com/announcing-warp-plus/">WARP is here</a></li><li><a title="The Technical Challenges of Building Cloudflare WARP" rel="nofollow" href="https://blog.cloudflare.com/warp-technical-challenges/">The Technical Challenges of Building Cloudflare WARP</a></li><li><a title="mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies" rel="nofollow" href="https://blog.cloudflare.com/mmproxy-creative-way-of-preserving-client-ips-in-spectrum/">mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies</a></li><li><a title="HTTP/3: the past, the present, and the future" rel="nofollow" href="https://blog.cloudflare.com/http3-the-past-present-and-future/">HTTP/3: the past, the present, and the future</a></li><li><a title="Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/cloudflare-google-chrome-and-firefox-add-http3-support/">Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet</a></li><li><a title="QUIC Implementations" rel="nofollow" href="https://github.com/quicwg/base-drafts/wiki/Implementations">QUIC Implementations</a></li><li><a title="Startpage.com - The world&#39;s most private search engine" rel="nofollow" href="https://www.startpage.com/en/">Startpage.com - The world's most private search engine</a></li><li><a title="Google extends support lifespan for seven Lenovo Chromebooks to 2025" rel="nofollow" href="https://www.androidpolice.com/2019/09/25/lenovo-chromebook-update-support-expire/">Google extends support lifespan for seven Lenovo Chromebooks to 2025</a></li><li><a title="Google’s Quantum Supremacy Announcement Shouldn&#39;t Be a Surprise" rel="nofollow" href="https://gizmodo.com/google-s-quantum-supremacy-announcement-shouldnt-be-a-s-1838357278">Google’s Quantum Supremacy Announcement Shouldn't Be a Surprise</a></li><li><a title="Scott’s Supreme Quantum Supremacy FAQ" rel="nofollow" href="https://www.scottaaronson.com/blog/?p=4317">Scott’s Supreme Quantum Supremacy FAQ</a></li><li><a title="AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/10/amd-ryzen-pro-3000-series-desktop-cpus-will-offer-full-ram-encryption/">AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We peer into the future with a quick look at quantum supremacy, debate the latest DNS over HTTPS drama, and jump through the hoops of HTTP/3.</p>

<p>Plus when to use WARP, the secrets of Startpage, and the latest Ryzen release. </p><p>Links:</p><ul><li><a title="Why big ISPs aren’t happy about Google’s plans for encrypted DNS" rel="nofollow" href="https://arstechnica.com/tech-policy/2019/09/isps-worry-a-new-chrome-feature-will-stop-them-from-spying-on-you/">Why big ISPs aren’t happy about Google’s plans for encrypted DNS</a></li><li><a title="Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade" rel="nofollow" href="https://blog.chromium.org/2019/09/experimenting-with-same-provider-dns.html">Chromium Blog: Experimenting with same-provider DNS-over-HTTPS upgrade</a></li><li><a title="How to enable DNS-over-HTTPS (DoH) in Google Chrome" rel="nofollow" href="https://www.zdnet.com/article/how-to-enable-dns-over-https-doh-in-google-chrome/">How to enable DNS-over-HTTPS (DoH) in Google Chrome</a></li><li><a title="What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases" rel="nofollow" href="https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-default/">What’s next in making Encrypted DNS-over-HTTPS the Default - Future Releases</a></li><li><a title="WARP is here" rel="nofollow" href="https://blog.cloudflare.com/announcing-warp-plus/">WARP is here</a></li><li><a title="The Technical Challenges of Building Cloudflare WARP" rel="nofollow" href="https://blog.cloudflare.com/warp-technical-challenges/">The Technical Challenges of Building Cloudflare WARP</a></li><li><a title="mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies" rel="nofollow" href="https://blog.cloudflare.com/mmproxy-creative-way-of-preserving-client-ips-in-spectrum/">mmproxy - Creative Linux routing to preserve client IP addresses in L7 proxies</a></li><li><a title="HTTP/3: the past, the present, and the future" rel="nofollow" href="https://blog.cloudflare.com/http3-the-past-present-and-future/">HTTP/3: the past, the present, and the future</a></li><li><a title="Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/cloudflare-google-chrome-and-firefox-add-http3-support/">Cloudflare, Google Chrome, and Firefox add HTTP/3 support | ZDNet</a></li><li><a title="QUIC Implementations" rel="nofollow" href="https://github.com/quicwg/base-drafts/wiki/Implementations">QUIC Implementations</a></li><li><a title="Startpage.com - The world&#39;s most private search engine" rel="nofollow" href="https://www.startpage.com/en/">Startpage.com - The world's most private search engine</a></li><li><a title="Google extends support lifespan for seven Lenovo Chromebooks to 2025" rel="nofollow" href="https://www.androidpolice.com/2019/09/25/lenovo-chromebook-update-support-expire/">Google extends support lifespan for seven Lenovo Chromebooks to 2025</a></li><li><a title="Google’s Quantum Supremacy Announcement Shouldn&#39;t Be a Surprise" rel="nofollow" href="https://gizmodo.com/google-s-quantum-supremacy-announcement-shouldnt-be-a-s-1838357278">Google’s Quantum Supremacy Announcement Shouldn't Be a Surprise</a></li><li><a title="Scott’s Supreme Quantum Supremacy FAQ" rel="nofollow" href="https://www.scottaaronson.com/blog/?p=4317">Scott’s Supreme Quantum Supremacy FAQ</a></li><li><a title="AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/10/amd-ryzen-pro-3000-series-desktop-cpus-will-offer-full-ram-encryption/">AMD Ryzen Pro 3000 series desktop CPUs will offer full RAM encryption | Ars Technica</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>412: Too Good To Be True</title>
  <link>https://techsnap.systems/412</link>
  <guid isPermaLink="false">d6b4d1e4-a600-45ff-bad6-5d1cd032a4af</guid>
  <pubDate>Fri, 20 Sep 2019 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/d6b4d1e4-a600-45ff-bad6-5d1cd032a4af.mp3" length="24913525" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>It's TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.</itunes:subtitle>
  <itunes:duration>34:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>It's TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.
Plus an update on Wifi 6, an enlightening Chromebook bug, and some not-quite-quantum key distribution. 
</description>
  <itunes:keywords>QKD, Quantum key distribution, quantum cryptography, cryptography, security, Chromebooks, ChromeOS, Neverware, CloudreadyOS, google, security updates, 802.11ax, Wifi 5, Wifi 6, WPA3, Wifi, wireless, Sure-Fi, RF Chrip, spread spectrum, industrial iot, iot, the wifi challenge, sysadmin podcast, HVAC, networking, ethernet, low bandwidth, DevOps, TechSNAP, Jupiter Broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.</p>

<p>Plus an update on Wifi 6, an enlightening Chromebook bug, and some not-quite-quantum key distribution.</p><p>Links:</p><ul><li><a title="RF Chirp tech: Long distance, incredible penetration, low bandwidth | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/rf-chirp-tech-long-distance-incredible-penetration-low-bandwidth/">RF Chirp tech: Long distance, incredible penetration, low bandwidth | Ars Technica</a> &mdash; Recently, I took the company's technology for a spin with a pair of hand-held demo communicators about the size of a kid's walkie-talkie. They don't do much—just light up with a signal strength reading on both devices, whenever a transmit button on either is pressed—but that's enough to get a good indication of whether the tech will work to solve a given problem.</li><li><a title="Wi-Fi 6 Is Officially Here: Certification Program Begins" rel="nofollow" href="https://www.anandtech.com/show/14875/wifi-6-is-officially-here-certification-program-begins">Wi-Fi 6 Is Officially Here: Certification Program Begins</a> &mdash; Finally, along with the launch of the certification program itself, the Wi-Fi Alliance has already certified its first dozen devices. </li><li><a title="Say hello to 802.11ax: Wi-Fi 6 device certification begins today | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/say-hello-to-802-11ax-wi-fi-6-device-certification-begins-today/">Say hello to 802.11ax: Wi-Fi 6 device certification begins today | Ars Technica</a> &mdash; Today, the Wi-Fi Alliance launched its Wi-Fi Certified 6 program, which means that the standard has been completely finalized, and device manufacturers and OEMs can begin the process of having the organization certify their products to carry the Wi-Fi 6 branding.
</li><li><a title="Someone sent us 21 more pictures of the leaked Pixel 4 XL - The Verge" rel="nofollow" href="https://www.theverge.com/2019/9/14/20865699/pixel-4-xl-leaked-photos-camera-specs">Someone sent us 21 more pictures of the leaked Pixel 4 XL - The Verge</a></li><li><a title="iPhone 11, iPhone 11 Pro, and iPhone 11 Pro Max: Hands-on with Apple’s new phones | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/iphone-11-iphone-11-pro-and-iphone-11-pro-max-hands-on-with-apples-new-phones/">iPhone 11, iPhone 11 Pro, and iPhone 11 Pro Max: Hands-on with Apple’s new phones | Ars Technica</a></li><li><a title="Some Chromebooks mistakenly declared themselves end-of-life last week | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/some-chromebooks-mistakenly-declared-themselves-end-of-life-last-week/">Some Chromebooks mistakenly declared themselves end-of-life last week | Ars Technica</a> &mdash; A lot of Chromebook and Chromebox users don't realize this, but all ChromeOS devices have an expiration date. Google's original policy was for devices to be supported for five years, but the company has recently extended that time to 6.5 years.

</li><li><a title="LINUX Unplugged 318: Manjaro Levels Up" rel="nofollow" href="https://linuxunplugged.com/318">LINUX Unplugged 318: Manjaro Levels Up</a></li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution | Ars Technica</a></li><li><a title="Gentle intro to Quantum Key Distribution (QKD) – Lahiru Madushanka" rel="nofollow" href="https://lahirumadushankablog.wordpress.com/2017/10/01/gentle-intro-to-quantum-key-distribution-qkd/">Gentle intro to Quantum Key Distribution (QKD) – Lahiru Madushanka</a></li><li><a title="The Super-Secure Quantum Cable Hiding in the Holland Tunnel - Bloomberg" rel="nofollow" href="https://www.bloomberg.com/news/articles/2019-01-14/the-super-secure-quantum-cable-hiding-in-the-holland-tunnel">The Super-Secure Quantum Cable Hiding in the Holland Tunnel - Bloomberg</a> &mdash;  Banks and governments are testing quantum key distribution technology to guard their closest secrets.</li><li><a title="Quantum Key Distribution - QKD" rel="nofollow" href="https://www.cse.wustl.edu/~jain/cse571-07/ftp/quantum/">Quantum Key Distribution - QKD</a> &mdash; This paper provides an overview of quantum key distribution targeted towards the computer science community. A brief description of the relevant principles from quantum mechanics is provided before surveying the most prominent quantum key distribution protocols present in the literature.</li><li><a title="TechSNAP 403: Keeping Systems Simple" rel="nofollow" href="https://techsnap.systems/403">TechSNAP 403: Keeping Systems Simple</a></li><li><a title="Linux Headlines" rel="nofollow" href="https://linuxheadlines.show/">Linux Headlines</a> &mdash; Linux and open source headlines every weekday, in under 3 minutes.

</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s TechSNAP story time as we head out into the field with Jim and put Sure-Fi technology to the test.</p>

<p>Plus an update on Wifi 6, an enlightening Chromebook bug, and some not-quite-quantum key distribution.</p><p>Links:</p><ul><li><a title="RF Chirp tech: Long distance, incredible penetration, low bandwidth | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/rf-chirp-tech-long-distance-incredible-penetration-low-bandwidth/">RF Chirp tech: Long distance, incredible penetration, low bandwidth | Ars Technica</a> &mdash; Recently, I took the company's technology for a spin with a pair of hand-held demo communicators about the size of a kid's walkie-talkie. They don't do much—just light up with a signal strength reading on both devices, whenever a transmit button on either is pressed—but that's enough to get a good indication of whether the tech will work to solve a given problem.</li><li><a title="Wi-Fi 6 Is Officially Here: Certification Program Begins" rel="nofollow" href="https://www.anandtech.com/show/14875/wifi-6-is-officially-here-certification-program-begins">Wi-Fi 6 Is Officially Here: Certification Program Begins</a> &mdash; Finally, along with the launch of the certification program itself, the Wi-Fi Alliance has already certified its first dozen devices. </li><li><a title="Say hello to 802.11ax: Wi-Fi 6 device certification begins today | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/say-hello-to-802-11ax-wi-fi-6-device-certification-begins-today/">Say hello to 802.11ax: Wi-Fi 6 device certification begins today | Ars Technica</a> &mdash; Today, the Wi-Fi Alliance launched its Wi-Fi Certified 6 program, which means that the standard has been completely finalized, and device manufacturers and OEMs can begin the process of having the organization certify their products to carry the Wi-Fi 6 branding.
</li><li><a title="Someone sent us 21 more pictures of the leaked Pixel 4 XL - The Verge" rel="nofollow" href="https://www.theverge.com/2019/9/14/20865699/pixel-4-xl-leaked-photos-camera-specs">Someone sent us 21 more pictures of the leaked Pixel 4 XL - The Verge</a></li><li><a title="iPhone 11, iPhone 11 Pro, and iPhone 11 Pro Max: Hands-on with Apple’s new phones | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/iphone-11-iphone-11-pro-and-iphone-11-pro-max-hands-on-with-apples-new-phones/">iPhone 11, iPhone 11 Pro, and iPhone 11 Pro Max: Hands-on with Apple’s new phones | Ars Technica</a></li><li><a title="Some Chromebooks mistakenly declared themselves end-of-life last week | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/09/some-chromebooks-mistakenly-declared-themselves-end-of-life-last-week/">Some Chromebooks mistakenly declared themselves end-of-life last week | Ars Technica</a> &mdash; A lot of Chromebook and Chromebox users don't realize this, but all ChromeOS devices have an expiration date. Google's original policy was for devices to be supported for five years, but the company has recently extended that time to 6.5 years.

</li><li><a title="LINUX Unplugged 318: Manjaro Levels Up" rel="nofollow" href="https://linuxunplugged.com/318">LINUX Unplugged 318: Manjaro Levels Up</a></li><li><a title="Fear the Man in the Middle? This company wants to sell quantum key distribution | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/04/fear-the-man-in-the-middle-this-company-wants-to-sell-quantum-key-distribution/">Fear the Man in the Middle? This company wants to sell quantum key distribution | Ars Technica</a></li><li><a title="Gentle intro to Quantum Key Distribution (QKD) – Lahiru Madushanka" rel="nofollow" href="https://lahirumadushankablog.wordpress.com/2017/10/01/gentle-intro-to-quantum-key-distribution-qkd/">Gentle intro to Quantum Key Distribution (QKD) – Lahiru Madushanka</a></li><li><a title="The Super-Secure Quantum Cable Hiding in the Holland Tunnel - Bloomberg" rel="nofollow" href="https://www.bloomberg.com/news/articles/2019-01-14/the-super-secure-quantum-cable-hiding-in-the-holland-tunnel">The Super-Secure Quantum Cable Hiding in the Holland Tunnel - Bloomberg</a> &mdash;  Banks and governments are testing quantum key distribution technology to guard their closest secrets.</li><li><a title="Quantum Key Distribution - QKD" rel="nofollow" href="https://www.cse.wustl.edu/~jain/cse571-07/ftp/quantum/">Quantum Key Distribution - QKD</a> &mdash; This paper provides an overview of quantum key distribution targeted towards the computer science community. A brief description of the relevant principles from quantum mechanics is provided before surveying the most prominent quantum key distribution protocols present in the literature.</li><li><a title="TechSNAP 403: Keeping Systems Simple" rel="nofollow" href="https://techsnap.systems/403">TechSNAP 403: Keeping Systems Simple</a></li><li><a title="Linux Headlines" rel="nofollow" href="https://linuxheadlines.show/">Linux Headlines</a> &mdash; Linux and open source headlines every weekday, in under 3 minutes.

</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>406: SACK Attack</title>
  <link>https://techsnap.systems/406</link>
  <guid isPermaLink="false">310be811-6d1b-4463-96f3-8fc9579a5d66</guid>
  <pubDate>Sun, 23 Jun 2019 18:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/310be811-6d1b-4463-96f3-8fc9579a5d66.mp3" length="31361276" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>A new vulnerability may be the next 'Ping of Death'; we explore the details of SACK Panic and break down what you need to know.</itunes:subtitle>
  <itunes:duration>43:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>A new vulnerability may be the next 'Ping of Death'; we explore the details of SACK Panic and break down what you need to know.
Plus Firefox zero days targeting Coinbase, the latest update on Rowhammer, and a few more reasons it's a great time to be a ZFS user. 
</description>
  <itunes:keywords>SACK Panic, TCP, networking, Linux, FreeBSD, security, mss, ping of death, rowhammer, rambleed, RAM, ECC, memory, DRAM, Firefox, backdoor, Mozilla, zero day, sandbox, sandbox escape, targeted attack, cryptocurrency, crypto, ZFS, OpenZFS, TRIM, SSD, encryption, raw send, device removal, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A new vulnerability may be the next &#39;Ping of Death&#39;; we explore the details of SACK Panic and break down what you need to know.</p>

<p>Plus Firefox zero days targeting Coinbase, the latest update on Rowhammer, and a few more reasons it&#39;s a great time to be a ZFS user.</p><p>Links:</p><ul><li><a title="SACK Panic Security Bulletin" rel="nofollow" href="https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md">SACK Panic Security Bulletin</a> &mdash; Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. The vulnerabilities specifically relate to the Maximum Segment Size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed “SACK Panic,” allows a remotely-triggered kernel panic on recent Linux kernels.</li><li><a title="Ubuntu SACK Panic Guidance" rel="nofollow" href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic">Ubuntu SACK Panic Guidance</a> &mdash; You should update your kernel to the versions specified below in the Updates section and reboot. Alternatively, Canonical Livepatch updates will be available to mitigate these two issues without the need to reboot.
</li><li><a title="Red Hat SACK Panic Advisory" rel="nofollow" href="https://access.redhat.com/security/vulnerabilities/tcpsack">Red Hat SACK Panic Advisory</a> &mdash; Red Hat customers running affected versions of these Red Hat products are strongly recommended to update them as soon as errata are available. Customers are urged to apply the available updates immediately and enable the mitigations as they feel appropriate.   

</li><li><a title="RFC 2018 - TCP Selective Acknowledgment Options" rel="nofollow" href="https://tools.ietf.org/html/rfc2018">RFC 2018 - TCP Selective Acknowledgment Options</a> &mdash; TCP may experience poor performance when multiple packets are lost from one window of data. With the limited information available from cumulative acknowledgments, a TCP sender can only learn about a single lost packet per round trip time.  An aggressive sender could choose to retransmit packets early, but such retransmitted segments may have already been successfully received. A Selective Acknowledgment (SACK) mechanism, combined with a selective repeat retransmission policy, can help to overcome these limitations.</li><li><a title="Ping of Death" rel="nofollow" href="https://insecure.org/sploits/ping-o-death.html">Ping of Death</a> &mdash; In a nutshell, it is possible to crash, reboot or otherwise kill a large number of systems by sending a ping of a certain size from a remote machine.</li><li><a title="Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/firefox-zero-day-was-used-in-attack-against-coinbase-employees-not-its-users/">Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet</a> &mdash; A recent Firefox zero-day that has made headlines across the tech news world this week was actually used in attacks against Coinbase employees, and not the company's users.</li><li><a title="Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/mozilla-fixes-second-firefox-zero-day-exploited-in-the-wild/">Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet</a> &mdash; Mozilla has released a second security update this week to patch a second zero-day that was being exploited in the wild to attack Coinbase employees and other cryptocurrency organizations.

</li><li><a title="RAMBleed" rel="nofollow" href="https://rambleed.com/">RAMBleed</a> &mdash; RAMBleed is a side-channel attack that enables an attacker to read out physical memory belonging to other processes. The implications of violating arbitrary privilege boundaries are numerous, and vary in severity based on the other software running on the target machine. As an example, in our paper we demonstrate an attack against OpenSSH in which we use RAMBleed to leak a 2048 bit RSA key. </li><li><a title="Digging into the new features in OpenZFS post-Linux migration | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/06/zfs-features-bugfixes-0-8-1/">Digging into the new features in OpenZFS post-Linux migration | Ars Technica</a> &mdash; One of the most important new features in 0.8 is Native ZFS Encryption. Until now, ZFS users have relied on OS-provided encrypted filesystem layers either above or below ZFS. While this approach does work, it presented difficulties.</li><li><a title="Allan Jude on Twitter" rel="nofollow" href="https://twitter.com/allanjude/status/1138651704558346245">Allan Jude on Twitter</a> &mdash; Once the FreeBSDs are upstreamed, everything is changing to 'OpenZFS', including the github organization currently know as 'zfsonlinux'.</li><li><a title="ZFS on Linux Releases" rel="nofollow" href="https://github.com/zfsonlinux/zfs/releases">ZFS on Linux Releases</a></li><li><a title="Linux Academy is hiring! " rel="nofollow" href="https://jobs.lever.co/linuxacademy/">Linux Academy is hiring! </a></li><li><a title="Mozilla teases $5-per-month ad-free news subscription" rel="nofollow" href="https://www.theverge.com/2019/7/5/20683059/mozilla-news-subscription-service-ad-free-scroll-price">Mozilla teases $5-per-month ad-free news subscription</a> &mdash; Mozilla has started teasing an ad-free news subscription service, which, for $5 per month, would offer ad-free browsing, audio readouts, and cross-platform syncing of news articles from a number of websites.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A new vulnerability may be the next &#39;Ping of Death&#39;; we explore the details of SACK Panic and break down what you need to know.</p>

<p>Plus Firefox zero days targeting Coinbase, the latest update on Rowhammer, and a few more reasons it&#39;s a great time to be a ZFS user.</p><p>Links:</p><ul><li><a title="SACK Panic Security Bulletin" rel="nofollow" href="https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md">SACK Panic Security Bulletin</a> &mdash; Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. The vulnerabilities specifically relate to the Maximum Segment Size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed “SACK Panic,” allows a remotely-triggered kernel panic on recent Linux kernels.</li><li><a title="Ubuntu SACK Panic Guidance" rel="nofollow" href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic">Ubuntu SACK Panic Guidance</a> &mdash; You should update your kernel to the versions specified below in the Updates section and reboot. Alternatively, Canonical Livepatch updates will be available to mitigate these two issues without the need to reboot.
</li><li><a title="Red Hat SACK Panic Advisory" rel="nofollow" href="https://access.redhat.com/security/vulnerabilities/tcpsack">Red Hat SACK Panic Advisory</a> &mdash; Red Hat customers running affected versions of these Red Hat products are strongly recommended to update them as soon as errata are available. Customers are urged to apply the available updates immediately and enable the mitigations as they feel appropriate.   

</li><li><a title="RFC 2018 - TCP Selective Acknowledgment Options" rel="nofollow" href="https://tools.ietf.org/html/rfc2018">RFC 2018 - TCP Selective Acknowledgment Options</a> &mdash; TCP may experience poor performance when multiple packets are lost from one window of data. With the limited information available from cumulative acknowledgments, a TCP sender can only learn about a single lost packet per round trip time.  An aggressive sender could choose to retransmit packets early, but such retransmitted segments may have already been successfully received. A Selective Acknowledgment (SACK) mechanism, combined with a selective repeat retransmission policy, can help to overcome these limitations.</li><li><a title="Ping of Death" rel="nofollow" href="https://insecure.org/sploits/ping-o-death.html">Ping of Death</a> &mdash; In a nutshell, it is possible to crash, reboot or otherwise kill a large number of systems by sending a ping of a certain size from a remote machine.</li><li><a title="Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/firefox-zero-day-was-used-in-attack-against-coinbase-employees-not-its-users/">Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet</a> &mdash; A recent Firefox zero-day that has made headlines across the tech news world this week was actually used in attacks against Coinbase employees, and not the company's users.</li><li><a title="Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/mozilla-fixes-second-firefox-zero-day-exploited-in-the-wild/">Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet</a> &mdash; Mozilla has released a second security update this week to patch a second zero-day that was being exploited in the wild to attack Coinbase employees and other cryptocurrency organizations.

</li><li><a title="RAMBleed" rel="nofollow" href="https://rambleed.com/">RAMBleed</a> &mdash; RAMBleed is a side-channel attack that enables an attacker to read out physical memory belonging to other processes. The implications of violating arbitrary privilege boundaries are numerous, and vary in severity based on the other software running on the target machine. As an example, in our paper we demonstrate an attack against OpenSSH in which we use RAMBleed to leak a 2048 bit RSA key. </li><li><a title="Digging into the new features in OpenZFS post-Linux migration | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/06/zfs-features-bugfixes-0-8-1/">Digging into the new features in OpenZFS post-Linux migration | Ars Technica</a> &mdash; One of the most important new features in 0.8 is Native ZFS Encryption. Until now, ZFS users have relied on OS-provided encrypted filesystem layers either above or below ZFS. While this approach does work, it presented difficulties.</li><li><a title="Allan Jude on Twitter" rel="nofollow" href="https://twitter.com/allanjude/status/1138651704558346245">Allan Jude on Twitter</a> &mdash; Once the FreeBSDs are upstreamed, everything is changing to 'OpenZFS', including the github organization currently know as 'zfsonlinux'.</li><li><a title="ZFS on Linux Releases" rel="nofollow" href="https://github.com/zfsonlinux/zfs/releases">ZFS on Linux Releases</a></li><li><a title="Linux Academy is hiring! " rel="nofollow" href="https://jobs.lever.co/linuxacademy/">Linux Academy is hiring! </a></li><li><a title="Mozilla teases $5-per-month ad-free news subscription" rel="nofollow" href="https://www.theverge.com/2019/7/5/20683059/mozilla-news-subscription-service-ad-free-scroll-price">Mozilla teases $5-per-month ad-free news subscription</a> &mdash; Mozilla has started teasing an ad-free news subscription service, which, for $5 per month, would offer ad-free browsing, audio readouts, and cross-platform syncing of news articles from a number of websites.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>404: Prefork Pitfalls</title>
  <link>https://techsnap.systems/404</link>
  <guid isPermaLink="false">e2a5afa9-3180-4551-91a0-e84e65eb61e1</guid>
  <pubDate>Sat, 25 May 2019 18:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/e2a5afa9-3180-4551-91a0-e84e65eb61e1.mp3" length="24351787" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We turn our eye to web server best practices, from the basics of CDNs to the importance of choosing the right multi-processing module.</itunes:subtitle>
  <itunes:duration>33:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We turn our eye to web server best practices, from the basics of CDNs to the importance of choosing the right multi-processing module.
Plus the right way to setup PHP, the trouble with benchmarking, and when to choose NGiNX.  
</description>
  <itunes:keywords>HTTP, web servers, nginx, apache, lighttpd, prefork, mod_php, php, concurrency, threadpool, threads, scalability, event loop, apache mpms, Multi-Processing Modules, varnish, CDN, static sites, wordpress, apache bench, benchmarking, w3 total cache, performance, networking, sysadmin, web hosting, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We turn our eye to web server best practices, from the basics of CDNs to the importance of choosing the right multi-processing module.</p>

<p>Plus the right way to setup PHP, the trouble with benchmarking, and when to choose NGiNX. </p><p>Links:</p><ul><li><a title="Jim&#39;s Blog: Installing WordPress on Apache the modern way" rel="nofollow" href="https://jrs-s.net/2019/05/25/installing-wordpress-on-apache-the-modern-way/">Jim's Blog: Installing WordPress on Apache the modern way</a> &mdash; It’s been bugging me for a while that there are no correct guides to be found about using modern Apache 2.4 or above with the Event or Worker MPMs. We’re going to go ahead and correct that lapse today, by walking through a brand-new WordPress install on a new Ubuntu 18.04 VM.
</li><li><a title="Apache Performance Tuning" rel="nofollow" href="https://httpd.apache.org/docs/2.4/misc/perf-tuning.html">Apache Performance Tuning</a> &mdash; Apache 2.x is a general-purpose webserver, designed to provide a balance of flexibility, portability, and performance. Although it has not been designed specifically to set benchmark records, Apache 2.x is capable of high performance in many real-world situations.</li><li><a title="Tuning Your Apache Server" rel="nofollow" href="https://www.linode.com/docs/web-servers/apache-tips-and-tricks/tuning-your-apache-server/">Tuning Your Apache Server</a></li><li><a title="worker - Apache HTTP Server Version 2.4" rel="nofollow" href="https://httpd.apache.org/docs/2.4/mod/worker.html">worker - Apache HTTP Server Version 2.4</a> &mdash; This Multi-Processing Module (MPM) implements a hybrid multi-process multi-threaded server. By using threads to serve requests, it is able to serve a large number of requests with fewer system resources than a process-based server.</li><li><a title="event - Apache HTTP Server Version 2.4" rel="nofollow" href="https://httpd.apache.org/docs/2.4/mod/event.html">event - Apache HTTP Server Version 2.4</a> &mdash; The event Multi-Processing Module (MPM) is designed to allow more requests to be served simultaneously by passing off some processing work to the listeners threads, freeing up the worker threads to serve new requests.

</li><li><a title="PHP-FPM" rel="nofollow" href="https://php-fpm.org/">PHP-FPM</a> &mdash; PHP-FPM (FastCGI Process Manager) is an alternative PHP FastCGI implementation with some additional features useful for sites of any size, especially busier sites.
</li><li><a title="FastCGI overview" rel="nofollow" href="https://help.dreamhost.com/hc/en-us/articles/217298967-FastCGI-overview">FastCGI overview</a> &mdash; FastCGI is a way to have CGI scripts execute time-consuming code (like opening a database) only once, rather than every time the script is loaded. In technical terms, FastCGI is a language independent, scalable, open extension to CGI that provides high performance without the limitations of server specific APIs.

</li><li><a title="Alexa Top 500 Global Sites" rel="nofollow" href="https://www.alexa.com/topsites">Alexa Top 500 Global Sites</a></li><li><a title="What Is a CDN? How Does a CDN work?" rel="nofollow" href="https://www.cloudflare.com/learning/cdn/what-is-a-cdn/">What Is a CDN? How Does a CDN work?</a> &mdash; A content delivery network (CDN) refers to a geographically distributed group of servers which work together to provide fast delivery of Internet content. </li><li><a title="W3 Total Cache – WordPress plugin" rel="nofollow" href="https://wordpress.org/plugins/w3-total-cache/">W3 Total Cache – WordPress plugin</a> &mdash; W3 Total Cache improves the SEO and user experience of your site by increasing website performance, reducing load times via features like content delivery network (CDN) integration and the latest best practices.

</li><li><a title="krakjoe/apcu: APCu - APC User Cache" rel="nofollow" href="https://github.com/krakjoe/apcu">krakjoe/apcu: APCu - APC User Cache</a> &mdash; APCu is an in-memory key-value store for PHP. Keys are of type string and values can be any PHP variables.

</li><li><a title="PHP: APCu - Manual" rel="nofollow" href="https://www.php.net/manual/en/book.apcu.php">PHP: APCu - Manual</a></li><li><a title="Introduction to Varnish — Varnish HTTP Cache" rel="nofollow" href="https://varnish-cache.org/intro/">Introduction to Varnish — Varnish HTTP Cache</a> &mdash; Varnish Cache is a web application accelerator also known as a caching HTTP reverse proxy. You install it in front of any server that speaks HTTP and configure it to cache the contents. Varnish Cache is really, really fast. It typically speeds up delivery with a factor of 300 - 1000x, depending on your architectur</li><li><a title="ab - Apache HTTP server benchmarking tool" rel="nofollow" href="https://httpd.apache.org/docs/2.4/programs/ab.html">ab - Apache HTTP server benchmarking tool</a> &mdash; ab is a tool for benchmarking your Apache Hypertext Transfer Protocol (HTTP) server. It is designed to give you an impression of how your current Apache installation performs. This especially shows you how many requests per second your Apache installation is capable of serving.</li><li><a title="HTTP(S) Benchmark Tools " rel="nofollow" href="https://gist.github.com/denji/8333630">HTTP(S) Benchmark Tools </a></li><li><a title="jimsalterjrs/network-testing" rel="nofollow" href="https://github.com/jimsalterjrs/network-testing">jimsalterjrs/network-testing</a> &mdash; This is a small collection of GPLv3-licensed tools to assist an intrepid researcher in testing the performance of networks, wired or wireless.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We turn our eye to web server best practices, from the basics of CDNs to the importance of choosing the right multi-processing module.</p>

<p>Plus the right way to setup PHP, the trouble with benchmarking, and when to choose NGiNX. </p><p>Links:</p><ul><li><a title="Jim&#39;s Blog: Installing WordPress on Apache the modern way" rel="nofollow" href="https://jrs-s.net/2019/05/25/installing-wordpress-on-apache-the-modern-way/">Jim's Blog: Installing WordPress on Apache the modern way</a> &mdash; It’s been bugging me for a while that there are no correct guides to be found about using modern Apache 2.4 or above with the Event or Worker MPMs. We’re going to go ahead and correct that lapse today, by walking through a brand-new WordPress install on a new Ubuntu 18.04 VM.
</li><li><a title="Apache Performance Tuning" rel="nofollow" href="https://httpd.apache.org/docs/2.4/misc/perf-tuning.html">Apache Performance Tuning</a> &mdash; Apache 2.x is a general-purpose webserver, designed to provide a balance of flexibility, portability, and performance. Although it has not been designed specifically to set benchmark records, Apache 2.x is capable of high performance in many real-world situations.</li><li><a title="Tuning Your Apache Server" rel="nofollow" href="https://www.linode.com/docs/web-servers/apache-tips-and-tricks/tuning-your-apache-server/">Tuning Your Apache Server</a></li><li><a title="worker - Apache HTTP Server Version 2.4" rel="nofollow" href="https://httpd.apache.org/docs/2.4/mod/worker.html">worker - Apache HTTP Server Version 2.4</a> &mdash; This Multi-Processing Module (MPM) implements a hybrid multi-process multi-threaded server. By using threads to serve requests, it is able to serve a large number of requests with fewer system resources than a process-based server.</li><li><a title="event - Apache HTTP Server Version 2.4" rel="nofollow" href="https://httpd.apache.org/docs/2.4/mod/event.html">event - Apache HTTP Server Version 2.4</a> &mdash; The event Multi-Processing Module (MPM) is designed to allow more requests to be served simultaneously by passing off some processing work to the listeners threads, freeing up the worker threads to serve new requests.

</li><li><a title="PHP-FPM" rel="nofollow" href="https://php-fpm.org/">PHP-FPM</a> &mdash; PHP-FPM (FastCGI Process Manager) is an alternative PHP FastCGI implementation with some additional features useful for sites of any size, especially busier sites.
</li><li><a title="FastCGI overview" rel="nofollow" href="https://help.dreamhost.com/hc/en-us/articles/217298967-FastCGI-overview">FastCGI overview</a> &mdash; FastCGI is a way to have CGI scripts execute time-consuming code (like opening a database) only once, rather than every time the script is loaded. In technical terms, FastCGI is a language independent, scalable, open extension to CGI that provides high performance without the limitations of server specific APIs.

</li><li><a title="Alexa Top 500 Global Sites" rel="nofollow" href="https://www.alexa.com/topsites">Alexa Top 500 Global Sites</a></li><li><a title="What Is a CDN? How Does a CDN work?" rel="nofollow" href="https://www.cloudflare.com/learning/cdn/what-is-a-cdn/">What Is a CDN? How Does a CDN work?</a> &mdash; A content delivery network (CDN) refers to a geographically distributed group of servers which work together to provide fast delivery of Internet content. </li><li><a title="W3 Total Cache – WordPress plugin" rel="nofollow" href="https://wordpress.org/plugins/w3-total-cache/">W3 Total Cache – WordPress plugin</a> &mdash; W3 Total Cache improves the SEO and user experience of your site by increasing website performance, reducing load times via features like content delivery network (CDN) integration and the latest best practices.

</li><li><a title="krakjoe/apcu: APCu - APC User Cache" rel="nofollow" href="https://github.com/krakjoe/apcu">krakjoe/apcu: APCu - APC User Cache</a> &mdash; APCu is an in-memory key-value store for PHP. Keys are of type string and values can be any PHP variables.

</li><li><a title="PHP: APCu - Manual" rel="nofollow" href="https://www.php.net/manual/en/book.apcu.php">PHP: APCu - Manual</a></li><li><a title="Introduction to Varnish — Varnish HTTP Cache" rel="nofollow" href="https://varnish-cache.org/intro/">Introduction to Varnish — Varnish HTTP Cache</a> &mdash; Varnish Cache is a web application accelerator also known as a caching HTTP reverse proxy. You install it in front of any server that speaks HTTP and configure it to cache the contents. Varnish Cache is really, really fast. It typically speeds up delivery with a factor of 300 - 1000x, depending on your architectur</li><li><a title="ab - Apache HTTP server benchmarking tool" rel="nofollow" href="https://httpd.apache.org/docs/2.4/programs/ab.html">ab - Apache HTTP server benchmarking tool</a> &mdash; ab is a tool for benchmarking your Apache Hypertext Transfer Protocol (HTTP) server. It is designed to give you an impression of how your current Apache installation performs. This especially shows you how many requests per second your Apache installation is capable of serving.</li><li><a title="HTTP(S) Benchmark Tools " rel="nofollow" href="https://gist.github.com/denji/8333630">HTTP(S) Benchmark Tools </a></li><li><a title="jimsalterjrs/network-testing" rel="nofollow" href="https://github.com/jimsalterjrs/network-testing">jimsalterjrs/network-testing</a> &mdash; This is a small collection of GPLv3-licensed tools to assist an intrepid researcher in testing the performance of networks, wired or wireless.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>397: Quality Tools</title>
  <link>https://techsnap.systems/397</link>
  <guid isPermaLink="false">a6b87767-ad4e-429f-b82a-703023411eb6</guid>
  <pubDate>Thu, 14 Feb 2019 21:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a6b87767-ad4e-429f-b82a-703023411eb6.mp3" length="29268241" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS.</itunes:subtitle>
  <itunes:duration>40:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS. 
Plus the importance of sane defaults and why netdata belongs on every system. 
</description>
  <itunes:keywords>bitorrent,latency,qos,bandwidth,networking,command line,wondershaper,tc,traffic control,queing discipline,network discipline ,FireHOL,FireQOS,netdata,qdisc,queues,traffic shaping,sane defaults,rate limit,tcp,udp,iptables,firewall,routing,home networking,netdata,monitoring,networking engineering,mpls,vpn,wireguard,openvpn,gre,bufferbloat,munin,nagios,collectd,prometheus,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS. </p>

<p>Plus the importance of sane defaults and why netdata belongs on every system.</p><p>Links:</p><ul><li><a title="Why you want QoS - Netdata Documentation" rel="nofollow" href="https://docs.netdata.cloud/collectors/tc.plugin/#why-you-want-qos">Why you want QoS - Netdata Documentation</a> &mdash; One of the features the Linux kernel has, but it is rarely used, is its ability to apply QoS on traffic. Even most interesting is that it can apply QoS to both inbound and outbound traffic.</li><li><a title="FireQOS Wiki" rel="nofollow" href="https://github.com/firehol/firehol/wiki/FireQOS">FireQOS Wiki</a> &mdash; FireQOS is a helper to assist you configure traffic shaping on Linux.

</li><li><a title="FireHOL - Linux firewalling and traffic shaping for humans" rel="nofollow" href="https://firehol.org/">FireHOL - Linux firewalling and traffic shaping for humans</a> &mdash; FireHOL is a language (and a program to run it) which builds secure, stateful firewalls from easy to understand, human-readable configurations. The configurations stay readable even for very complex setups.</li><li><a title="tc(8) man page" rel="nofollow" href="https://linux.die.net/man/8/tc">tc(8) man page</a> &mdash; Traffic Control consists of the following:

SHAPING
When traffic is shaped, its rate of transmission is under control. Shaping may be more than lowering the available bandwidth - it is also used to smooth out bursts in traffic for better network behaviour. Shaping occurs on egress.
SCHEDULING
By scheduling the transmission of packets it is possible to improve interactivity for traffic that needs it while still guaranteeing bandwidth to bulk transfers. Reordering is also called prioritizing, and happens only on egress.
POLICING
Where shaping deals with transmission of traffic, policing pertains to traffic arriving. Policing thus occurs on ingress.
DROPPING
Traffic exceeding a set bandwidth may also be dropped forthwith, both on ingress and on egress.</li><li><a title="Overview of Traffic Control Concepts" rel="nofollow" href="http://tldp.org/HOWTO/Traffic-Control-HOWTO/overview.html">Overview of Traffic Control Concepts</a> &mdash; Traffic control is the name given to the sets of queuing systems and mechanisms by which packets are received and transmitted on a router. This includes deciding which (and whether) packets to accept at what rate on the input of an interface and determining which packets to transmit in what order at what rate on the output of an interface.</li><li><a title="Advanced traffic control - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/advanced_traffic_control">Advanced traffic control - ArchWiki</a></li><li><a title="Journey to the Center of the Linux Kernel: Traffic Control, Shaping and QoS" rel="nofollow" href="http://wiki.linuxwall.info/doku.php/en:ressources:dossiers:networking:traffic_control">Journey to the Center of the Linux Kernel: Traffic Control, Shaping and QoS</a> &mdash; This document describes the Traffic Control subsystem of the Linux Kernel in depth, algorithm by algorithm, and shows how it can be used to manage the outgoing traffic of a Linux system.</li><li><a title="Netdata Real-time performance monitoring, done right!" rel="nofollow" href="https://github.com/netdata/netdata">Netdata Real-time performance monitoring, done right!</a> &mdash; Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring agent you install on all your systems and containers.</li><li><a title="Add more charts to netdata" rel="nofollow" href="https://github.com/netdata/netdata/blob/master/docs/Add-more-charts-to-netdata.md#add-more-charts-to-netdata">Add more charts to netdata</a> &mdash; To collect non-system metrics, netdata supports a plugin architecture. </li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Join Jim and Wes as they battle bufferbloat, latency spikes, and network hogs with some of their favorite tools for traffic shaping, firewalling, and QoS. </p>

<p>Plus the importance of sane defaults and why netdata belongs on every system.</p><p>Links:</p><ul><li><a title="Why you want QoS - Netdata Documentation" rel="nofollow" href="https://docs.netdata.cloud/collectors/tc.plugin/#why-you-want-qos">Why you want QoS - Netdata Documentation</a> &mdash; One of the features the Linux kernel has, but it is rarely used, is its ability to apply QoS on traffic. Even most interesting is that it can apply QoS to both inbound and outbound traffic.</li><li><a title="FireQOS Wiki" rel="nofollow" href="https://github.com/firehol/firehol/wiki/FireQOS">FireQOS Wiki</a> &mdash; FireQOS is a helper to assist you configure traffic shaping on Linux.

</li><li><a title="FireHOL - Linux firewalling and traffic shaping for humans" rel="nofollow" href="https://firehol.org/">FireHOL - Linux firewalling and traffic shaping for humans</a> &mdash; FireHOL is a language (and a program to run it) which builds secure, stateful firewalls from easy to understand, human-readable configurations. The configurations stay readable even for very complex setups.</li><li><a title="tc(8) man page" rel="nofollow" href="https://linux.die.net/man/8/tc">tc(8) man page</a> &mdash; Traffic Control consists of the following:

SHAPING
When traffic is shaped, its rate of transmission is under control. Shaping may be more than lowering the available bandwidth - it is also used to smooth out bursts in traffic for better network behaviour. Shaping occurs on egress.
SCHEDULING
By scheduling the transmission of packets it is possible to improve interactivity for traffic that needs it while still guaranteeing bandwidth to bulk transfers. Reordering is also called prioritizing, and happens only on egress.
POLICING
Where shaping deals with transmission of traffic, policing pertains to traffic arriving. Policing thus occurs on ingress.
DROPPING
Traffic exceeding a set bandwidth may also be dropped forthwith, both on ingress and on egress.</li><li><a title="Overview of Traffic Control Concepts" rel="nofollow" href="http://tldp.org/HOWTO/Traffic-Control-HOWTO/overview.html">Overview of Traffic Control Concepts</a> &mdash; Traffic control is the name given to the sets of queuing systems and mechanisms by which packets are received and transmitted on a router. This includes deciding which (and whether) packets to accept at what rate on the input of an interface and determining which packets to transmit in what order at what rate on the output of an interface.</li><li><a title="Advanced traffic control - ArchWiki" rel="nofollow" href="https://wiki.archlinux.org/index.php/advanced_traffic_control">Advanced traffic control - ArchWiki</a></li><li><a title="Journey to the Center of the Linux Kernel: Traffic Control, Shaping and QoS" rel="nofollow" href="http://wiki.linuxwall.info/doku.php/en:ressources:dossiers:networking:traffic_control">Journey to the Center of the Linux Kernel: Traffic Control, Shaping and QoS</a> &mdash; This document describes the Traffic Control subsystem of the Linux Kernel in depth, algorithm by algorithm, and shows how it can be used to manage the outgoing traffic of a Linux system.</li><li><a title="Netdata Real-time performance monitoring, done right!" rel="nofollow" href="https://github.com/netdata/netdata">Netdata Real-time performance monitoring, done right!</a> &mdash; Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring agent you install on all your systems and containers.</li><li><a title="Add more charts to netdata" rel="nofollow" href="https://github.com/netdata/netdata/blob/master/docs/Add-more-charts-to-netdata.md#add-more-charts-to-netdata">Add more charts to netdata</a> &mdash; To collect non-system metrics, netdata supports a plugin architecture. </li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>395: The ACME Era</title>
  <link>https://techsnap.systems/395</link>
  <guid isPermaLink="false">26a02c39-f731-48d1-9539-2d910465a6f7</guid>
  <pubDate>Sun, 20 Jan 2019 20:45:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/26a02c39-f731-48d1-9539-2d910465a6f7.mp3" length="28300543" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.</itunes:subtitle>
  <itunes:duration>33:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.
The history, the clients, and the from-the-field details you'll want to know. 
</description>
  <itunes:keywords>SSL, TLS, public key cryptography. X.509, EV, DV, Domain Verification, Extended Verification, StartSSL, CSR, SSL certificates, TLS certificates, BGP, ACME, Let’s Encrypt, Certbot, Mozilla, EFF, Automation, NGINX, Apache, Traefik, caddy,  DNS, HTTP,  HTTPS, Encryption, ISRG, TLS-SNI-01, ACME V2, Mail Server, Exim, Dovecot, Postfix, IETF, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.</p>

<p>The history, the clients, and the from-the-field details you&#39;ll want to know.</p><p>Links:</p><ul><li><a title=" Let’s Encrypt and CertBot – JRS Systems" rel="nofollow" href="http://jrs-s.net/2018/12/22/reverse-proxy-lets-encrypt-certbot/"> Let’s Encrypt and CertBot – JRS Systems</a></li><li><a title="Automatic Certificate Management Environment (ACME)" rel="nofollow" href="https://ietf-wg-acme.github.io/acme/draft-ietf-acme-acme.html#rfc.section.8">Automatic Certificate Management Environment (ACME)</a> &mdash; The surprisingly readable IETF draft.</li><li><a title="How It Works - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/how-it-works/">How It Works - Let's Encrypt</a></li><li><a title="ACME Client Implementations" rel="nofollow" href="https://letsencrypt.org/docs/client-options/">ACME Client Implementations</a></li><li><a title="Certbot" rel="nofollow" href="https://github.com/certbot/certbot">Certbot</a> &mdash; Certbot is EFF's tool to obtain certs from Let's Encrypt.</li><li><a title="acme-nginx: python acme client for nginx" rel="nofollow" href="https://github.com/kshcherban/acme-nginx">acme-nginx: python acme client for nginx</a> &mdash; A particularly simple client that is useful for understanding the protocol details.</li><li><a title="Caddy - The HTTP/2 Web Server with Automatic HTTPS" rel="nofollow" href="https://caddyserver.com/">Caddy - The HTTP/2 Web Server with Automatic HTTPS</a></li><li><a title="mod_md: Let&#39;s Encrypt (ACME) support for Apache httpd" rel="nofollow" href="https://github.com/icing/mod_md">mod_md: Let's Encrypt (ACME) support for Apache httpd</a></li><li><a title="Traefik - The Cloud Native Edge Router" rel="nofollow" href="https://traefik.io/">Traefik - The Cloud Native Edge Router</a></li><li><a title="Looking Forward to 2019 - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/2018/12/31/looking-forward-to-2019.html">Looking Forward to 2019 - Let's Encrypt</a> &mdash; We’re now serving more than 150 million websites while maintaining a stellar security and compliance track record. Most importantly though, the Web went from 67% encrypted page loads to 77% in 2018, according to statistics from Mozilla. This is an incredible rate of change!</li><li><a title="Let&#39;s Encrypt ACME v2 API Announcements" rel="nofollow" href="https://community.letsencrypt.org/t/staging-endpoint-for-acme-v2/49605">Let's Encrypt ACME v2 API Announcements</a> &mdash; Now that the draft standard is in last-call and the pace of major changes has slowed, we’re able to release a “v2” API that is much closer to what will become the final ACME RFC.</li><li><a title="Let&#39;s Encrypt disables TLS-SNI-01 validation" rel="nofollow" href="https://www.zdnet.com/article/lets-encrypt-disables-tls-sni-01-validation/">Let's Encrypt disables TLS-SNI-01 validation</a> &mdash; The researcher noticed that "at least two" large hosting providers host many users on the same IP address and users are able to upload certificates for arbitrary names without proving they have control of a domain.</li><li><a title="A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF" rel="nofollow" href="https://www.eff.org/deeplinks/2019/01/encrypting-web-encrypting-net-primer-using-certbot-secure-your-mailserver">A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF</a> &mdash; With the most recent release of Certbot v0.29.1, we’ve added some features which make it much easier to use with both Sendmail and Exim.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We welcome Jim to the show, and he and Wes dive deep into all things Let’s Encrypt.</p>

<p>The history, the clients, and the from-the-field details you&#39;ll want to know.</p><p>Links:</p><ul><li><a title=" Let’s Encrypt and CertBot – JRS Systems" rel="nofollow" href="http://jrs-s.net/2018/12/22/reverse-proxy-lets-encrypt-certbot/"> Let’s Encrypt and CertBot – JRS Systems</a></li><li><a title="Automatic Certificate Management Environment (ACME)" rel="nofollow" href="https://ietf-wg-acme.github.io/acme/draft-ietf-acme-acme.html#rfc.section.8">Automatic Certificate Management Environment (ACME)</a> &mdash; The surprisingly readable IETF draft.</li><li><a title="How It Works - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/how-it-works/">How It Works - Let's Encrypt</a></li><li><a title="ACME Client Implementations" rel="nofollow" href="https://letsencrypt.org/docs/client-options/">ACME Client Implementations</a></li><li><a title="Certbot" rel="nofollow" href="https://github.com/certbot/certbot">Certbot</a> &mdash; Certbot is EFF's tool to obtain certs from Let's Encrypt.</li><li><a title="acme-nginx: python acme client for nginx" rel="nofollow" href="https://github.com/kshcherban/acme-nginx">acme-nginx: python acme client for nginx</a> &mdash; A particularly simple client that is useful for understanding the protocol details.</li><li><a title="Caddy - The HTTP/2 Web Server with Automatic HTTPS" rel="nofollow" href="https://caddyserver.com/">Caddy - The HTTP/2 Web Server with Automatic HTTPS</a></li><li><a title="mod_md: Let&#39;s Encrypt (ACME) support for Apache httpd" rel="nofollow" href="https://github.com/icing/mod_md">mod_md: Let's Encrypt (ACME) support for Apache httpd</a></li><li><a title="Traefik - The Cloud Native Edge Router" rel="nofollow" href="https://traefik.io/">Traefik - The Cloud Native Edge Router</a></li><li><a title="Looking Forward to 2019 - Let&#39;s Encrypt" rel="nofollow" href="https://letsencrypt.org/2018/12/31/looking-forward-to-2019.html">Looking Forward to 2019 - Let's Encrypt</a> &mdash; We’re now serving more than 150 million websites while maintaining a stellar security and compliance track record. Most importantly though, the Web went from 67% encrypted page loads to 77% in 2018, according to statistics from Mozilla. This is an incredible rate of change!</li><li><a title="Let&#39;s Encrypt ACME v2 API Announcements" rel="nofollow" href="https://community.letsencrypt.org/t/staging-endpoint-for-acme-v2/49605">Let's Encrypt ACME v2 API Announcements</a> &mdash; Now that the draft standard is in last-call and the pace of major changes has slowed, we’re able to release a “v2” API that is much closer to what will become the final ACME RFC.</li><li><a title="Let&#39;s Encrypt disables TLS-SNI-01 validation" rel="nofollow" href="https://www.zdnet.com/article/lets-encrypt-disables-tls-sni-01-validation/">Let's Encrypt disables TLS-SNI-01 validation</a> &mdash; The researcher noticed that "at least two" large hosting providers host many users on the same IP address and users are able to upload certificates for arbitrary names without proving they have control of a domain.</li><li><a title="A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF" rel="nofollow" href="https://www.eff.org/deeplinks/2019/01/encrypting-web-encrypting-net-primer-using-certbot-secure-your-mailserver">A Technical Deep Dive on Using Certbot to Secure your Mailserver from the EFF</a> &mdash; With the most recent release of Certbot v0.29.1, we’ve added some features which make it much easier to use with both Sendmail and Exim.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>394: All About Azure</title>
  <link>https://techsnap.systems/394</link>
  <guid isPermaLink="false">2e588701-e7a1-4462-99fa-e7ea2275b375</guid>
  <pubDate>Thu, 10 Jan 2019 04:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/2e588701-e7a1-4462-99fa-e7ea2275b375.mp3" length="22259879" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths.</itunes:subtitle>
  <itunes:duration>26:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths. Special Guest: Chad M. Crowell.
</description>
  <itunes:keywords>Azure, Microsoft, AWS, Cloud, command line, virtualization, Hybrid Cloud, Active Directory, VPC, VPN, Powershell, Powershell core, Azure Sphere, Azure Stack, File Sync, MSSQL, Windows, Linux, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths.</p><p>Special Guest: Chad M. Crowell.</p><p>Links:</p><ul><li><a title="Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years" rel="nofollow" href="https://news.microsoft.com/features/under-the-sea-microsoft-tests-a-datacenter-thats-quick-to-deploy-could-provide-internet-connectivity-for-years/">Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years</a></li><li><a title="An Azure Infrastructure Year in Review" rel="nofollow" href="https://www.petri.com/an-azure-infrastructure-year-in-review-2018">An Azure Infrastructure Year in Review</a></li><li><a title="Azure File Sync now generally available" rel="nofollow" href="https://azure.microsoft.com/en-us/blog/score-one-for-the-it-pro-azure-file-sync-is-now-generally-available/">Azure File Sync now generally available</a></li><li><a title="Microsoft&#39;s Newest OS is Based on Linux" rel="nofollow" href="https://www.omgubuntu.co.uk/2018/04/microsoft-linux-custom-kernel-azure-sphere">Microsoft's Newest OS is Based on Linux</a></li><li><a title="Azure Sphere" rel="nofollow" href="https://azure.microsoft.com/en-us/services/azure-sphere/">Azure Sphere</a></li><li><a title="What is Azure Stack?" rel="nofollow" href="https://azure.microsoft.com/en-us/overview/azure-stack/">What is Azure Stack?</a></li><li><a title="Azure Outage Proves the Hard Way Availability Zones are a Good Idea" rel="nofollow" href="https://www.datacenterknowledge.com/microsoft/azure-outage-proves-hard-way-availability-zones-are-good-idea">Azure Outage Proves the Hard Way Availability Zones are a Good Idea</a></li><li><a title=" Microsoft Azure Infrastructure and Deployment on Linux Academy" rel="nofollow" href="https://linuxacademy.com/azure/training/course/name/microsoft-azure-infrastructure-and-deployment-exam-az-100"> Microsoft Azure Infrastructure and Deployment on Linux Academy</a> &mdash; In this course, we will cover an introduction to the Azure portal, followed by how to build infrastructure and deploy that infrastructure in real world scenarios.</li><li><a title="Chad Crowell on Twitter" rel="nofollow" href="https://twitter.com/chadmcrowell?lang=en">Chad Crowell on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Wes is joined by a special guest to take a look back on the growth and development of Azure in 2018 and discuss some of its unique strengths.</p><p>Special Guest: Chad M. Crowell.</p><p>Links:</p><ul><li><a title="Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years" rel="nofollow" href="https://news.microsoft.com/features/under-the-sea-microsoft-tests-a-datacenter-thats-quick-to-deploy-could-provide-internet-connectivity-for-years/">Under the sea, Microsoft tests a datacenter that’s quick to deploy, could provide internet connectivity for years</a></li><li><a title="An Azure Infrastructure Year in Review" rel="nofollow" href="https://www.petri.com/an-azure-infrastructure-year-in-review-2018">An Azure Infrastructure Year in Review</a></li><li><a title="Azure File Sync now generally available" rel="nofollow" href="https://azure.microsoft.com/en-us/blog/score-one-for-the-it-pro-azure-file-sync-is-now-generally-available/">Azure File Sync now generally available</a></li><li><a title="Microsoft&#39;s Newest OS is Based on Linux" rel="nofollow" href="https://www.omgubuntu.co.uk/2018/04/microsoft-linux-custom-kernel-azure-sphere">Microsoft's Newest OS is Based on Linux</a></li><li><a title="Azure Sphere" rel="nofollow" href="https://azure.microsoft.com/en-us/services/azure-sphere/">Azure Sphere</a></li><li><a title="What is Azure Stack?" rel="nofollow" href="https://azure.microsoft.com/en-us/overview/azure-stack/">What is Azure Stack?</a></li><li><a title="Azure Outage Proves the Hard Way Availability Zones are a Good Idea" rel="nofollow" href="https://www.datacenterknowledge.com/microsoft/azure-outage-proves-hard-way-availability-zones-are-good-idea">Azure Outage Proves the Hard Way Availability Zones are a Good Idea</a></li><li><a title=" Microsoft Azure Infrastructure and Deployment on Linux Academy" rel="nofollow" href="https://linuxacademy.com/azure/training/course/name/microsoft-azure-infrastructure-and-deployment-exam-az-100"> Microsoft Azure Infrastructure and Deployment on Linux Academy</a> &mdash; In this course, we will cover an introduction to the Azure portal, followed by how to build infrastructure and deploy that infrastructure in real world scenarios.</li><li><a title="Chad Crowell on Twitter" rel="nofollow" href="https://twitter.com/chadmcrowell?lang=en">Chad Crowell on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>393: Back to our /roots</title>
  <link>https://techsnap.systems/393</link>
  <guid isPermaLink="false">1126dc11-7156-4c4d-84f1-a9aa9bf4ebcf</guid>
  <pubDate>Thu, 03 Jan 2019 04:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/1126dc11-7156-4c4d-84f1-a9aa9bf4ebcf.mp3" length="19076619" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</itunes:subtitle>
  <itunes:duration>22:22</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend. 
</description>
  <itunes:keywords>Security Breach, Flash, AWS, Cloud, Bitcoin, Dropbox, Sony, PSN Breach, Wordpress, SSL, TLS, Allan Jude, FreeBSD, Jim Salter, Information Density, Automation, Bitcoin, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</p><p>Links:</p><ul><li><a title="Jim Salter" rel="nofollow" href="https://arstechnica.com/author/jimsalter/">Jim Salter</a> &mdash; Jim Salter (@jrssnet) is an author, public speaker, small business owner, mercenary sysadmin, and father of three—not necessarily in that order. He got his first real taste of open source by running Apache on his very own dedicated FreeBSD 3.1 server back in 1999, and he's been a fierce advocate of FOSS ever since.</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet?lang=en">Jim Salter on Twitter</a></li><li><a title="Dropbox Flaws | TechSNAP | 1" rel="nofollow" href="https://www.youtube.com/watch?v=n7La9Z-XrCE&amp;t=972s">Dropbox Flaws | TechSNAP | 1</a></li><li><a title="PSN Breech Details | TechSNAP 3" rel="nofollow" href="https://www.youtube.com/watch?v=d5FCF9lpVYE">PSN Breech Details | TechSNAP 3</a></li><li><a title="2089 Days Uptime | TechSNAP 300" rel="nofollow" href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/">2089 Days Uptime | TechSNAP 300</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</p><p>Links:</p><ul><li><a title="Jim Salter" rel="nofollow" href="https://arstechnica.com/author/jimsalter/">Jim Salter</a> &mdash; Jim Salter (@jrssnet) is an author, public speaker, small business owner, mercenary sysadmin, and father of three—not necessarily in that order. He got his first real taste of open source by running Apache on his very own dedicated FreeBSD 3.1 server back in 1999, and he's been a fierce advocate of FOSS ever since.</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet?lang=en">Jim Salter on Twitter</a></li><li><a title="Dropbox Flaws | TechSNAP | 1" rel="nofollow" href="https://www.youtube.com/watch?v=n7La9Z-XrCE&amp;t=972s">Dropbox Flaws | TechSNAP | 1</a></li><li><a title="PSN Breech Details | TechSNAP 3" rel="nofollow" href="https://www.youtube.com/watch?v=d5FCF9lpVYE">PSN Breech Details | TechSNAP 3</a></li><li><a title="2089 Days Uptime | TechSNAP 300" rel="nofollow" href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/">2089 Days Uptime | TechSNAP 300</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>392: Keeping up with Kubernetes</title>
  <link>https://techsnap.systems/392</link>
  <guid isPermaLink="false">45523a8f-70a8-4800-a757-964c8f91f645</guid>
  <pubDate>Wed, 12 Dec 2018 19:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/45523a8f-70a8-4800-a757-964c8f91f645.mp3" length="23364271" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. 
</itunes:subtitle>
  <itunes:duration>27:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. 
Plus the biggest stories out of Kubecon, and serverless gets serious. 
</description>
  <itunes:keywords>Kubecon, Kubernetes, Istio, CNCF, etcd, traefik, knative, google, k8s, red hat, ibm, openwhisk, serverless, faas, rook, cloud native, storage, ceph, Helm, Helm hub, Elasticsearch, Chromium OS, Chromium, Event driven, CloudEvent, Containers, Container Vulnerability, GitLab, Crossplane, Control Plane, Multicloud, holiday, christmas, security.christmas, CVE, Security Vulnerability, CVE-2018-1002105, kube-apiserver, websocket, RBAC, HTTP, metrics, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. </p>

<p>Plus the biggest stories out of Kubecon, and serverless gets serious.</p><p>Links:</p><ul><li><a title="Everything that was announced at KubeCon" rel="nofollow" href="https://venturebeat.com/2018/12/11/everything-that-was-announced-at-kubecon-cloudnativecon/">Everything that was announced at KubeCon</a></li><li><a title="CNCF to Host etcd" rel="nofollow" href="https://www.cncf.io/blog/2018/12/11/cncf-to-host-etcd/">CNCF to Host etcd</a> &mdash; The Cloud Native Computing Foundation Technical Oversight Committee voted to accept etcd as an incubation-level hosted project.</li><li><a title="Introduction to Knative" rel="nofollow" href="https://medium.com/@pczarkowski/introduction-to-knative-b93a0b9aeeef">Introduction to Knative</a> &mdash; Knative is a framework from the folks at Google and Pivotal focused on “serverless” style event driven functions.</li><li><a title="IBM Embraces Knative to Drive Serverless Standardization" rel="nofollow" href="https://www.eweek.com/cloud/ibm-embraces-knative-to-drive-serverless-standardization">IBM Embraces Knative to Drive Serverless Standardization</a> &mdash; Knative is not the first open-source functions-as-a-service effort that IBM has backed. Back in 2016, IBM announced the OpenWhisk effort, which is now run as an open-source project at the Apache Software Found.</li><li><a title="How Google Is Improving Kubernetes Container Security" rel="nofollow" href="http://www.eweek.com/security/how-google-is-improving-kubernetes-container-security">How Google Is Improving Kubernetes Container Security</a> &mdash; "We go beyond what's in open source and put additional restrictions in place to secure users"</li><li><a title="Demystifying Kubernetes CVE-2018-1002105" rel="nofollow" href="https://www.twistlock.com/labs-blog/demystifying-kubernetes-cve-2018-1002105-dead-simple-exploit/">Demystifying Kubernetes CVE-2018-1002105</a> &mdash; With a specially crafted request, users that are authorized to establish a connection through the Kubernetes API server to a backend server can then send arbitrary requests over the same connection directly to that backend, authenticated with the Kubernetes API server’s TLS credentials used to establish the backend connection.</li><li><a title="The silent CVE in the heart of Kubernetes apiserver" rel="nofollow" href="https://gravitational.com/blog/kubernetes-websocket-upgrade-security-vulnerability/">The silent CVE in the heart of Kubernetes apiserver</a></li><li><a title="Crossplane: An Open Source Multicloud Control Plane" rel="nofollow" href="https://github.com/crossplaneio/crossplane">Crossplane: An Open Source Multicloud Control Plane</a></li><li><a title="security.christmas" rel="nofollow" href="https://security.christmas/">security.christmas</a> &mdash; This year we will prepare you for the Christmas celebration, by giving you small presents of knowledge every day, which will teach you about the world of security.</li><li><a title="Introducing the Helm Hub" rel="nofollow" href="https://www.helm.sh/blog/intro-helm-hub/index.html">Introducing the Helm Hub</a> &mdash; This hub provides a means for you to find charts hosted in many distributed repositories hosted by numerous people and organizations.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A security vulnerability in Kubernetes causes a big stir, but we’ll break it all down and explain what went wrong. </p>

<p>Plus the biggest stories out of Kubecon, and serverless gets serious.</p><p>Links:</p><ul><li><a title="Everything that was announced at KubeCon" rel="nofollow" href="https://venturebeat.com/2018/12/11/everything-that-was-announced-at-kubecon-cloudnativecon/">Everything that was announced at KubeCon</a></li><li><a title="CNCF to Host etcd" rel="nofollow" href="https://www.cncf.io/blog/2018/12/11/cncf-to-host-etcd/">CNCF to Host etcd</a> &mdash; The Cloud Native Computing Foundation Technical Oversight Committee voted to accept etcd as an incubation-level hosted project.</li><li><a title="Introduction to Knative" rel="nofollow" href="https://medium.com/@pczarkowski/introduction-to-knative-b93a0b9aeeef">Introduction to Knative</a> &mdash; Knative is a framework from the folks at Google and Pivotal focused on “serverless” style event driven functions.</li><li><a title="IBM Embraces Knative to Drive Serverless Standardization" rel="nofollow" href="https://www.eweek.com/cloud/ibm-embraces-knative-to-drive-serverless-standardization">IBM Embraces Knative to Drive Serverless Standardization</a> &mdash; Knative is not the first open-source functions-as-a-service effort that IBM has backed. Back in 2016, IBM announced the OpenWhisk effort, which is now run as an open-source project at the Apache Software Found.</li><li><a title="How Google Is Improving Kubernetes Container Security" rel="nofollow" href="http://www.eweek.com/security/how-google-is-improving-kubernetes-container-security">How Google Is Improving Kubernetes Container Security</a> &mdash; "We go beyond what's in open source and put additional restrictions in place to secure users"</li><li><a title="Demystifying Kubernetes CVE-2018-1002105" rel="nofollow" href="https://www.twistlock.com/labs-blog/demystifying-kubernetes-cve-2018-1002105-dead-simple-exploit/">Demystifying Kubernetes CVE-2018-1002105</a> &mdash; With a specially crafted request, users that are authorized to establish a connection through the Kubernetes API server to a backend server can then send arbitrary requests over the same connection directly to that backend, authenticated with the Kubernetes API server’s TLS credentials used to establish the backend connection.</li><li><a title="The silent CVE in the heart of Kubernetes apiserver" rel="nofollow" href="https://gravitational.com/blog/kubernetes-websocket-upgrade-security-vulnerability/">The silent CVE in the heart of Kubernetes apiserver</a></li><li><a title="Crossplane: An Open Source Multicloud Control Plane" rel="nofollow" href="https://github.com/crossplaneio/crossplane">Crossplane: An Open Source Multicloud Control Plane</a></li><li><a title="security.christmas" rel="nofollow" href="https://security.christmas/">security.christmas</a> &mdash; This year we will prepare you for the Christmas celebration, by giving you small presents of knowledge every day, which will teach you about the world of security.</li><li><a title="Introducing the Helm Hub" rel="nofollow" href="https://www.helm.sh/blog/intro-helm-hub/index.html">Introducing the Helm Hub</a> &mdash; This hub provides a means for you to find charts hosted in many distributed repositories hosted by numerous people and organizations.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 391: Firecracker Fundamentals</title>
  <link>https://techsnap.systems/391</link>
  <guid isPermaLink="false">85bdbb45-28a2-4d50-bed1-ade6768e3fa3</guid>
  <pubDate>Thu, 29 Nov 2018 14:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/85bdbb45-28a2-4d50-bed1-ade6768e3fa3.mp3" length="18175107" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different than the options on the market now.</itunes:subtitle>
  <itunes:duration>21:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.
Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.
</description>
  <itunes:keywords>Firecracker, AWS, Amazon, Serverless, Lambda, Fargate, QEMU, KVM, Virtualization, Virtual Machines, VENOM, Rust,  BGP, OpenBSD, RPKI, MITM, dive, Docker, evilginx2, proxy, Sennheiser, TLS, SSL, OpenBGPD, RIPE, LSI, RAID, Allan Jude, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.</p>

<p>Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.</p><p>Links:</p><ul><li><a title="Firecracker – Lightweight Virtualization for Serverless Computing" rel="nofollow" href="https://aws.amazon.com/blogs/aws/firecracker-lightweight-virtualization-for-serverless-computing/">Firecracker – Lightweight Virtualization for Serverless Computing</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker" rel="nofollow" href="https://firecracker-microvm.github.io/">Firecracker</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker Design Docs" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/blob/master/docs/design.md">Firecracker Design Docs</a></li><li><a title="Firecracker Roadmap" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/labels/Roadmap">Firecracker Roadmap</a></li><li><a title="QEMU" rel="nofollow" href="https://www.qemu.org/">QEMU</a> &mdash; QEMU is a generic and open source machine emulator and virtualizer.</li><li><a title="Qemu : Security vulnerabilities" rel="nofollow" href="https://www.cvedetails.com/vulnerability-list/vendor_id-7506/Qemu.html">Qemu : Security vulnerabilities</a></li><li><a title="VENOM Vulnerability" rel="nofollow" href="https://venom.crowdstrike.com/">VENOM Vulnerability</a> &mdash; VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host.</li><li><a title="s2n" rel="nofollow" href="https://github.com/awslabs/s2n">s2n</a> &mdash; s2n is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority.</li><li><a title="OpenBGPD - Adding Diversity to the Route Server Landscape" rel="nofollow" href="https://labs.ripe.net/Members/claudio_jeker/openbgpd-adding-diversity-to-route-server-landscape">OpenBGPD - Adding Diversity to the Route Server Landscape</a> &mdash; Thanks to the RIPE NCC Community Project Fund we were able to revive the OpenBGPD daemon and bring more diversity to the Route Server landscape.</li><li><a title="OpenBGPD" rel="nofollow" href="http://www.openbgpd.org/">OpenBGPD</a> &mdash; OpenBGPD is a FREE implementation of the Border Gateway Protocol, Version 4. It allows ordinary machines to be used as routers exchanging routes with other systems speaking the BGP protocol.</li><li><a title="LSI Questions from Anton" rel="nofollow" href="https://pastebin.com/rJxLBFBQ">LSI Questions from Anton</a></li><li><a title="ServeTheHome" rel="nofollow" href="https://www.servethehome.com/">ServeTheHome</a></li><li><a title="Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/sennheiser-headset-software-could-allow-man-in-the-middle-ssl-attacks/">Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks</a> &mdash; When users have been installing Sennheiser's HeadSetup software, little did they know that the software was also installing a root certificate into the Trusted Root CA Certificate store.  To make matters worse, the software was also installing an encrypted version of the certificate's private key that was not as secure as the developers may have thought.

</li><li><a title="evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" rel="nofollow" href="https://github.com/kgretzky/evilginx2">evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication</a></li><li><a title="dive: A tool for exploring each layer in a docker image" rel="nofollow" href="https://github.com/wagoodman/dive">dive: A tool for exploring each layer in a docker image</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We break down Firecracker Amazon’s new open source kvm powered, virtual machine monitor, and explore what makes it different from the options on the market now.</p>

<p>Plus some good news for OpenBGP and the wider internet community, and a handy tool for inspecting docker images.</p><p>Links:</p><ul><li><a title="Firecracker – Lightweight Virtualization for Serverless Computing" rel="nofollow" href="https://aws.amazon.com/blogs/aws/firecracker-lightweight-virtualization-for-serverless-computing/">Firecracker – Lightweight Virtualization for Serverless Computing</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker" rel="nofollow" href="https://firecracker-microvm.github.io/">Firecracker</a> &mdash; Firecracker is an open source virtualization technology that is purpose-built for creating and managing secure, multi-tenant containers and functions-based services.</li><li><a title="Firecracker Design Docs" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/blob/master/docs/design.md">Firecracker Design Docs</a></li><li><a title="Firecracker Roadmap" rel="nofollow" href="https://github.com/firecracker-microvm/firecracker/labels/Roadmap">Firecracker Roadmap</a></li><li><a title="QEMU" rel="nofollow" href="https://www.qemu.org/">QEMU</a> &mdash; QEMU is a generic and open source machine emulator and virtualizer.</li><li><a title="Qemu : Security vulnerabilities" rel="nofollow" href="https://www.cvedetails.com/vulnerability-list/vendor_id-7506/Qemu.html">Qemu : Security vulnerabilities</a></li><li><a title="VENOM Vulnerability" rel="nofollow" href="https://venom.crowdstrike.com/">VENOM Vulnerability</a> &mdash; VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host.</li><li><a title="s2n" rel="nofollow" href="https://github.com/awslabs/s2n">s2n</a> &mdash; s2n is a C99 implementation of the TLS/SSL protocols that is designed to be simple, small, fast, and with security as a priority.</li><li><a title="OpenBGPD - Adding Diversity to the Route Server Landscape" rel="nofollow" href="https://labs.ripe.net/Members/claudio_jeker/openbgpd-adding-diversity-to-route-server-landscape">OpenBGPD - Adding Diversity to the Route Server Landscape</a> &mdash; Thanks to the RIPE NCC Community Project Fund we were able to revive the OpenBGPD daemon and bring more diversity to the Route Server landscape.</li><li><a title="OpenBGPD" rel="nofollow" href="http://www.openbgpd.org/">OpenBGPD</a> &mdash; OpenBGPD is a FREE implementation of the Border Gateway Protocol, Version 4. It allows ordinary machines to be used as routers exchanging routes with other systems speaking the BGP protocol.</li><li><a title="LSI Questions from Anton" rel="nofollow" href="https://pastebin.com/rJxLBFBQ">LSI Questions from Anton</a></li><li><a title="ServeTheHome" rel="nofollow" href="https://www.servethehome.com/">ServeTheHome</a></li><li><a title="Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/sennheiser-headset-software-could-allow-man-in-the-middle-ssl-attacks/">Sennheiser Headset Software Could Allow Man-in-the-Middle SSL Attacks</a> &mdash; When users have been installing Sennheiser's HeadSetup software, little did they know that the software was also installing a root certificate into the Trusted Root CA Certificate store.  To make matters worse, the software was also installing an encrypted version of the certificate's private key that was not as secure as the developers may have thought.

</li><li><a title="evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" rel="nofollow" href="https://github.com/kgretzky/evilginx2">evilginx2: Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication</a></li><li><a title="dive: A tool for exploring each layer in a docker image" rel="nofollow" href="https://github.com/wagoodman/dive">dive: A tool for exploring each layer in a docker image</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 390: What’s Up with WireGuard</title>
  <link>https://techsnap.systems/390</link>
  <guid isPermaLink="false">6cd3cd3c-79c7-4978-8102-042f935a1344</guid>
  <pubDate>Thu, 22 Nov 2018 10:30:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/6cd3cd3c-79c7-4978-8102-042f935a1344.mp3" length="29616549" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t.</itunes:subtitle>
  <itunes:duration>34:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t. Special Guest: Jim Salter.
</description>
  <itunes:keywords>WireGuard, VPN, IPSEC, Linux, Algo, Private Networking, Jim Salter, ssh, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="How to easily configure WireGuard" rel="nofollow" href="https://www.stavros.io/posts/how-to-configure-wireguard/">How to easily configure WireGuard</a> &mdash; At its core, all WireGuard does is create an interface from one computer to another.</li><li><a title="Jessie Frazelle&#39;s Blog: Installing and Using Wireguard, obviously with containers" rel="nofollow" href="https://blog.jessfraz.com/post/installing-and-using-wireguard/">Jessie Frazelle's Blog: Installing and Using Wireguard, obviously with containers</a> &mdash; What is cool about Wireguard is it integrates into the Linux networking stack.</li><li><a title="WireGuard Didn&#39;t Make it To The Mainline Linux Kernel This Cycle" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-Not-In-4.20">WireGuard Didn't Make it To The Mainline Linux Kernel This Cycle</a> &mdash; The code continues to be improved upon but looks like it came up just short of making it into this current development cycle. </li><li><a title="WireGuard VPN review: A new type of VPN offers serious advantages" rel="nofollow" href="https://arstechnica.com/gadgets/2018/08/wireguard-vpn-review-fast-connections-amaze-but-windows-support-needs-to-happen/">WireGuard VPN review: A new type of VPN offers serious advantages</a> &mdash; Fewer lines of code, simpler setup, and better algorithms make a strong case.
</li><li><a title="The Current Status of WireGuard VPNs - Are We There Yet?" rel="nofollow" href="https://www.privateinternetaccess.com/blog/2018/09/the-current-status-of-wireguard-vpns-are-we-there-yet/">The Current Status of WireGuard VPNs - Are We There Yet?</a></li><li><a title="Using a free VPN? Why not skip the middleman and just send your data to President Xi?" rel="nofollow" href="https://www.theregister.co.uk/2018/11/19/vpn_app_investigation/">Using a free VPN? Why not skip the middleman and just send your data to President Xi?</a></li><li><a title="Feedback from Cody" rel="nofollow" href="https://pastebin.com/RNvV6EQF">Feedback from Cody</a></li><li><a title="NRE Labs" rel="nofollow" href="https://labs.networkreliability.engineering/">NRE Labs</a> &mdash; NRE Labs is a no-strings-attached, community-centered initiative to bring the skills of automation within reach for everyone</li><li><a title="Introduction to Antidote" rel="nofollow" href="https://antidoteproject.readthedocs.io/en/latest/">Introduction to Antidote</a> &mdash; Antidote is an open-source project aimed at making automated network operations more accessible with fast, easy and fun learning.</li><li><a title="StackStorm" rel="nofollow" href="https://stackstorm.com/">StackStorm</a> &mdash; From simple if/then rules to complicated workflows, StackStorm lets you automate DevOps your way.</li><li><a title="wireguard-private-networking: Build your own multi server private network using wireguard and ansible" rel="nofollow" href="https://github.com/mawalu/wireguard-private-networking">wireguard-private-networking: Build your own multi server private network using wireguard and ansible</a></li><li><a title="Algo: Set up a personal IPSEC or WireGuard VPN in the cloud" rel="nofollow" href="https://github.com/trailofbits/algo">Algo: Set up a personal IPSEC or WireGuard VPN in the cloud</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>WireGuard has a lot of buzz around it and for many good reasons. We’ll explain what WireGuard is specifically, what it can do, and maybe more importantly, what it can’t.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="How to easily configure WireGuard" rel="nofollow" href="https://www.stavros.io/posts/how-to-configure-wireguard/">How to easily configure WireGuard</a> &mdash; At its core, all WireGuard does is create an interface from one computer to another.</li><li><a title="Jessie Frazelle&#39;s Blog: Installing and Using Wireguard, obviously with containers" rel="nofollow" href="https://blog.jessfraz.com/post/installing-and-using-wireguard/">Jessie Frazelle's Blog: Installing and Using Wireguard, obviously with containers</a> &mdash; What is cool about Wireguard is it integrates into the Linux networking stack.</li><li><a title="WireGuard Didn&#39;t Make it To The Mainline Linux Kernel This Cycle" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=WireGuard-Not-In-4.20">WireGuard Didn't Make it To The Mainline Linux Kernel This Cycle</a> &mdash; The code continues to be improved upon but looks like it came up just short of making it into this current development cycle. </li><li><a title="WireGuard VPN review: A new type of VPN offers serious advantages" rel="nofollow" href="https://arstechnica.com/gadgets/2018/08/wireguard-vpn-review-fast-connections-amaze-but-windows-support-needs-to-happen/">WireGuard VPN review: A new type of VPN offers serious advantages</a> &mdash; Fewer lines of code, simpler setup, and better algorithms make a strong case.
</li><li><a title="The Current Status of WireGuard VPNs - Are We There Yet?" rel="nofollow" href="https://www.privateinternetaccess.com/blog/2018/09/the-current-status-of-wireguard-vpns-are-we-there-yet/">The Current Status of WireGuard VPNs - Are We There Yet?</a></li><li><a title="Using a free VPN? Why not skip the middleman and just send your data to President Xi?" rel="nofollow" href="https://www.theregister.co.uk/2018/11/19/vpn_app_investigation/">Using a free VPN? Why not skip the middleman and just send your data to President Xi?</a></li><li><a title="Feedback from Cody" rel="nofollow" href="https://pastebin.com/RNvV6EQF">Feedback from Cody</a></li><li><a title="NRE Labs" rel="nofollow" href="https://labs.networkreliability.engineering/">NRE Labs</a> &mdash; NRE Labs is a no-strings-attached, community-centered initiative to bring the skills of automation within reach for everyone</li><li><a title="Introduction to Antidote" rel="nofollow" href="https://antidoteproject.readthedocs.io/en/latest/">Introduction to Antidote</a> &mdash; Antidote is an open-source project aimed at making automated network operations more accessible with fast, easy and fun learning.</li><li><a title="StackStorm" rel="nofollow" href="https://stackstorm.com/">StackStorm</a> &mdash; From simple if/then rules to complicated workflows, StackStorm lets you automate DevOps your way.</li><li><a title="wireguard-private-networking: Build your own multi server private network using wireguard and ansible" rel="nofollow" href="https://github.com/mawalu/wireguard-private-networking">wireguard-private-networking: Build your own multi server private network using wireguard and ansible</a></li><li><a title="Algo: Set up a personal IPSEC or WireGuard VPN in the cloud" rel="nofollow" href="https://github.com/trailofbits/algo">Algo: Set up a personal IPSEC or WireGuard VPN in the cloud</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 389: The Future of HTTP</title>
  <link>https://techsnap.systems/389</link>
  <guid isPermaLink="false">a3776de2-0fab-45fc-8d29-dcd0f2e6da03</guid>
  <pubDate>Thu, 15 Nov 2018 15:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/a3776de2-0fab-45fc-8d29-dcd0f2e6da03.mp3" length="37053157" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.</itunes:subtitle>
  <itunes:duration>43:46</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Wes is joined by special guest Jim Salter to discuss Google's recent BGP outage and the future of HTTP.
Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router. Special Guest: Jim Salter.
</description>
  <itunes:keywords>BGP, Google, MainOne, China Telecom, BGP Security, RPKI, BGP Leak, BGP Hijack, HTTP, TLS, QUIC, HTTP/3, Encryption, UDP, Spam, Router, UPnP, Botnet, Broadcom, BCMUPnP_Hunter, format string vulnerability, HTTP-over-QUIC, Router Security, WireGuard, Homebrew Router, Wifi, Jim Salter, Ars Technica, Sanoid, Security, Networking, SysAdmin, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Wes is joined by special guest Jim Salter to discuss Google&#39;s recent BGP outage and the future of HTTP.</p>

<p>Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="Google goes down after major BGP mishap routes traffic through China" rel="nofollow" href="https://arstechnica.com/information-technology/2018/11/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china/">Google goes down after major BGP mishap routes traffic through China</a> &mdash; Google lost control of several million of its IP addresses for more than an hour on Monday in an event that intermittently made its search and other services unavailable to many users.</li><li><a title="Internet Vulnerability Takes Down Google" rel="nofollow" href="https://blog.thousandeyes.com/internet-vulnerability-takes-down-google/">Internet Vulnerability Takes Down Google</a></li><li><a title="China has been &#39;hijacking the vital internet backbone of western countries&#39;" rel="nofollow" href="https://www.zdnet.com/article/china-has-been-hijacking-the-vital-internet-backbone-of-western-countries/">China has been 'hijacking the vital internet backbone of western countries'</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="HTTP/3" rel="nofollow" href="https://daniel.haxx.se/blog/2018/11/11/http-3/">HTTP/3</a> &mdash; The protocol that's been called HTTP-over-QUIC for quite some time has now changed name and will officially become HTTP/3.</li><li><a title="HTTP/3: Come for the speed, stay for the security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/14/http-3-come-for-the-speed-stay-for-the-security/">HTTP/3: Come for the speed, stay for the security</a></li><li><a title="The Road to QUIC" rel="nofollow" href="https://blog.cloudflare.com/the-road-to-quic/">The Road to QUIC</a></li><li><a title="Botnet pwns 100,000 routers using ancient security flaw" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/12/botnet-pwns-100000-routers-using-ancient-security-flaw/">Botnet pwns 100,000 routers using ancient security flaw</a> &mdash; Researchers have stumbled on another large botnet that’s been quietly hijacking home routers while nobody was paying attention</li><li><a title="BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers" rel="nofollow" href="http://www.dcwg.org/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers/">BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers</a></li><li><a title="From Zero to ZeroDay Journey: Router Hacking" rel="nofollow" href="http://defensecode.com/whitepapers/From_Zero_To_ZeroDay_Network_Devices_Exploitation.txt">From Zero to ZeroDay Journey: Router Hacking</a></li><li><a title="The Ars guide to building a Linux router from scratch" rel="nofollow" href="https://arstechnica.com/gadgets/2016/04/the-ars-guide-to-building-a-linux-router-from-scratch/">The Ars guide to building a Linux router from scratch</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Wes is joined by special guest Jim Salter to discuss Google&#39;s recent BGP outage and the future of HTTP.</p>

<p>Plus the latest router botnet, why you should never go full UPnP, and the benefits of building your own home router.</p><p>Special Guest: Jim Salter.</p><p>Links:</p><ul><li><a title="Google goes down after major BGP mishap routes traffic through China" rel="nofollow" href="https://arstechnica.com/information-technology/2018/11/major-bgp-mishap-takes-down-google-as-traffic-improperly-travels-to-china/">Google goes down after major BGP mishap routes traffic through China</a> &mdash; Google lost control of several million of its IP addresses for more than an hour on Monday in an event that intermittently made its search and other services unavailable to many users.</li><li><a title="Internet Vulnerability Takes Down Google" rel="nofollow" href="https://blog.thousandeyes.com/internet-vulnerability-takes-down-google/">Internet Vulnerability Takes Down Google</a></li><li><a title="China has been &#39;hijacking the vital internet backbone of western countries&#39;" rel="nofollow" href="https://www.zdnet.com/article/china-has-been-hijacking-the-vital-internet-backbone-of-western-countries/">China has been 'hijacking the vital internet backbone of western countries'</a></li><li><a title="RPKI - The required cryptographic upgrade to BGP routing" rel="nofollow" href="https://blog.cloudflare.com/rpki/">RPKI - The required cryptographic upgrade to BGP routing</a></li><li><a title="HTTP/3" rel="nofollow" href="https://daniel.haxx.se/blog/2018/11/11/http-3/">HTTP/3</a> &mdash; The protocol that's been called HTTP-over-QUIC for quite some time has now changed name and will officially become HTTP/3.</li><li><a title="HTTP/3: Come for the speed, stay for the security" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/14/http-3-come-for-the-speed-stay-for-the-security/">HTTP/3: Come for the speed, stay for the security</a></li><li><a title="The Road to QUIC" rel="nofollow" href="https://blog.cloudflare.com/the-road-to-quic/">The Road to QUIC</a></li><li><a title="Botnet pwns 100,000 routers using ancient security flaw" rel="nofollow" href="https://nakedsecurity.sophos.com/2018/11/12/botnet-pwns-100000-routers-using-ancient-security-flaw/">Botnet pwns 100,000 routers using ancient security flaw</a> &mdash; Researchers have stumbled on another large botnet that’s been quietly hijacking home routers while nobody was paying attention</li><li><a title="BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers" rel="nofollow" href="http://www.dcwg.org/bcmpupnp_hunter-a-100k-botnet-turns-home-routers-to-email-spammers/">BCMPUPnP_Hunter: A 100k Botnet Turns Home Routers to Email Spammers</a></li><li><a title="From Zero to ZeroDay Journey: Router Hacking" rel="nofollow" href="http://defensecode.com/whitepapers/From_Zero_To_ZeroDay_Network_Devices_Exploitation.txt">From Zero to ZeroDay Journey: Router Hacking</a></li><li><a title="The Ars guide to building a Linux router from scratch" rel="nofollow" href="https://arstechnica.com/gadgets/2016/04/the-ars-guide-to-building-a-linux-router-from-scratch/">The Ars guide to building a Linux router from scratch</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 388: The One About eBPF</title>
  <link>https://techsnap.systems/388</link>
  <guid isPermaLink="false">64a6b392-dd6b-4be1-805a-e88b17e029ec</guid>
  <pubDate>Thu, 25 Oct 2018 15:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/64a6b392-dd6b-4be1-805a-e88b17e029ec.mp3" length="31325387" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We explain what eBPF is, how it works, and its proud BSD production legacy.</itunes:subtitle>
  <itunes:duration>36:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We explain what eBPF is, how it works, and its proud BSD production legacy.
eBPF is a technology that you’re going to be hearing more and more about. It powers low-overhead custom analysis tools, handles network security in a containerized world, and powers tools you use every day.
</description>
  <itunes:keywords>MeetBSD, BPF, eBPF, Linux, LWN, Linus, seccomp, XDP, bpfilter, virtual machine, tracing, observability, bcc, bpftrace, dtrace, monitoring, bytecode, up, ultimate plumber, pipecut, networking, security, containers, kernel, shell, pipeline, instrumentation, kprobe, tcpdump, SysAdmin, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We explain what eBPF is, how it works, and its proud BSD production legacy.</p>

<p>eBPF is a technology that you’re going to be hearing more and more about. It powers low-overhead custom analysis tools, handles network security in a containerized world, and powers tools you use every day.</p><p>Links:</p><ul><li><a title="Chris Goes to MeetBSD" rel="nofollow" href="https://linuxunplugged.com/articles/meetbsd2018">Chris Goes to MeetBSD</a></li><li><a title="​Linus Torvalds talks about coming back to work on Linux | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/linus-torvalds-talks-about-coming-back-to-work-on-linux/">​Linus Torvalds talks about coming back to work on Linux | ZDNet</a> &mdash; BPF has actually been really useful, and the real power of it is how it allows people to do specialized code that isn't enabled until asked for.</li><li><a title="The Kernel Report - Jonathan Corbet" rel="nofollow" href="https://www.youtube.com/watch?v=XQGUi5Gu0D8&amp;feature=youtu.be&amp;t=840">The Kernel Report - Jonathan Corbet</a></li><li><a title="BPF - the forgotten bytecode" rel="nofollow" href="https://blog.cloudflare.com/bpf-the-forgotten-bytecode/">BPF - the forgotten bytecode</a> &mdash; All this changed in 1993 when Steven McCanne and Van Jacobson published the paper introducing a better way of filtering packets in the kernel, they called it "The BSD Packet Filter" (BPF)</li><li><a title="The BSD Packet Filter" rel="nofollow" href="http://www.tcpdump.org/papers/bpf-usenix93.pdf">The BSD Packet Filter</a></li><li><a title="eBPF: Past, Present, and Future" rel="nofollow" href="https://ferrisellis.com/posts/ebpf_past_present_future/">eBPF: Past, Present, and Future</a> &mdash; The Extended Berkeley Packet Filter, or eBPF, has rapidly been adopted into a number of Linux kernel systems since its introduction into the Linux kernel in late 2014. Understanding eBPF, however, can be difficult as many try to explain it via a use of eBPF as opposed to its design. Indeed eBPF's name indicates that it is for packet filtering even though it now has uses which have nothing to do with networking.</li><li><a title="Using eBPF in Kubernetes" rel="nofollow" href="https://kubernetes.io/blog/2017/12/using-ebpf-in-kubernetes/">Using eBPF in Kubernetes</a> &mdash; Cilium is a networking project that makes heavy use of eBPF superpowers to route and filter network traffic for container-based systems. By using eBPF, Cilium can dynamically generate and apply rules—even at the device level with XDP—without making changes to the Linux kernel itself</li><li><a title="Why is the kernel community replacing iptables with BPF?" rel="nofollow" href="https://cilium.io/blog/2018/04/17/why-is-the-kernel-community-replacing-iptables/">Why is the kernel community replacing iptables with BPF?</a> &mdash; The Linux kernel community recently announced bpfilter, which will replace the long-standing in-kernel implementation of iptables with high-performance network filtering powered by Linux BPF, all while guaranteeing a non-disruptive transition for Linux users.</li><li><a title="bpftrace (DTrace 2.0) for Linux 2018" rel="nofollow" href="http://www.brendangregg.com/blog/2018-10-08/dtrace-for-linux-2018.html">bpftrace (DTrace 2.0) for Linux 2018</a> &mdash; Created by Alastair Robertson, bpftrace is an open source high-level tracing front-end that lets you analyze systems in custom ways. It's shaping up to be a DTrace version 2.0: more capable, and built from the ground up for the modern era of the eBPF virtual machine.</li><li><a title="The bpftrace One-Liner Tutorial" rel="nofollow" href="https://github.com/iovisor/bpftrace/blob/master/docs/tutorial_one_liners.md">The bpftrace One-Liner Tutorial</a></li><li><a title="BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more" rel="nofollow" href="https://github.com/iovisor/bcc">BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more</a> &mdash; BCC is a toolkit for creating efficient kernel tracing and manipulation programs, and includes several useful tools and examples.</li><li><a title="Linux eBPF Tracing Tools" rel="nofollow" href="http://www.brendangregg.com/ebpf.html">Linux eBPF Tracing Tools</a> &mdash; This page shows examples of performance analysis tools using enhancements to BPF (Berkeley Packet Filter) which were added to the Linux 4.x series kernels, allowing BPF to do much more than just filtering packets. These enhancements allow custom analysis programs to be executed on Linux dynamic tracing, static tracing, and profiling events.</li><li><a title="eBPF Vulnerability (CVE-2017-16995): When the Doorman Becomes the Backdoor" rel="nofollow" href="https://blog.aquasec.com/ebpf-vulnerability-cve-2017-16995-when-the-doorman-becomes-the-backdoor">eBPF Vulnerability (CVE-2017-16995): When the Doorman Becomes the Backdoor</a></li><li><a title="Ultimate Plumber" rel="nofollow" href="https://github.com/akavel/up">Ultimate Plumber</a> &mdash; Ultimate Plumber is a tool for writing Linux pipes with instant live preview
</li><li><a title="BSD Now 073: Pipe Dreams" rel="nofollow" href="http://www.bsdnow.tv/episodes/2015_01_21-pipe_dreams">BSD Now 073: Pipe Dreams</a> &mdash; Interview w/ David Maxwell about Pipecut, text processing, and commandline wizardry.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We explain what eBPF is, how it works, and its proud BSD production legacy.</p>

<p>eBPF is a technology that you’re going to be hearing more and more about. It powers low-overhead custom analysis tools, handles network security in a containerized world, and powers tools you use every day.</p><p>Links:</p><ul><li><a title="Chris Goes to MeetBSD" rel="nofollow" href="https://linuxunplugged.com/articles/meetbsd2018">Chris Goes to MeetBSD</a></li><li><a title="​Linus Torvalds talks about coming back to work on Linux | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/linus-torvalds-talks-about-coming-back-to-work-on-linux/">​Linus Torvalds talks about coming back to work on Linux | ZDNet</a> &mdash; BPF has actually been really useful, and the real power of it is how it allows people to do specialized code that isn't enabled until asked for.</li><li><a title="The Kernel Report - Jonathan Corbet" rel="nofollow" href="https://www.youtube.com/watch?v=XQGUi5Gu0D8&amp;feature=youtu.be&amp;t=840">The Kernel Report - Jonathan Corbet</a></li><li><a title="BPF - the forgotten bytecode" rel="nofollow" href="https://blog.cloudflare.com/bpf-the-forgotten-bytecode/">BPF - the forgotten bytecode</a> &mdash; All this changed in 1993 when Steven McCanne and Van Jacobson published the paper introducing a better way of filtering packets in the kernel, they called it "The BSD Packet Filter" (BPF)</li><li><a title="The BSD Packet Filter" rel="nofollow" href="http://www.tcpdump.org/papers/bpf-usenix93.pdf">The BSD Packet Filter</a></li><li><a title="eBPF: Past, Present, and Future" rel="nofollow" href="https://ferrisellis.com/posts/ebpf_past_present_future/">eBPF: Past, Present, and Future</a> &mdash; The Extended Berkeley Packet Filter, or eBPF, has rapidly been adopted into a number of Linux kernel systems since its introduction into the Linux kernel in late 2014. Understanding eBPF, however, can be difficult as many try to explain it via a use of eBPF as opposed to its design. Indeed eBPF's name indicates that it is for packet filtering even though it now has uses which have nothing to do with networking.</li><li><a title="Using eBPF in Kubernetes" rel="nofollow" href="https://kubernetes.io/blog/2017/12/using-ebpf-in-kubernetes/">Using eBPF in Kubernetes</a> &mdash; Cilium is a networking project that makes heavy use of eBPF superpowers to route and filter network traffic for container-based systems. By using eBPF, Cilium can dynamically generate and apply rules—even at the device level with XDP—without making changes to the Linux kernel itself</li><li><a title="Why is the kernel community replacing iptables with BPF?" rel="nofollow" href="https://cilium.io/blog/2018/04/17/why-is-the-kernel-community-replacing-iptables/">Why is the kernel community replacing iptables with BPF?</a> &mdash; The Linux kernel community recently announced bpfilter, which will replace the long-standing in-kernel implementation of iptables with high-performance network filtering powered by Linux BPF, all while guaranteeing a non-disruptive transition for Linux users.</li><li><a title="bpftrace (DTrace 2.0) for Linux 2018" rel="nofollow" href="http://www.brendangregg.com/blog/2018-10-08/dtrace-for-linux-2018.html">bpftrace (DTrace 2.0) for Linux 2018</a> &mdash; Created by Alastair Robertson, bpftrace is an open source high-level tracing front-end that lets you analyze systems in custom ways. It's shaping up to be a DTrace version 2.0: more capable, and built from the ground up for the modern era of the eBPF virtual machine.</li><li><a title="The bpftrace One-Liner Tutorial" rel="nofollow" href="https://github.com/iovisor/bpftrace/blob/master/docs/tutorial_one_liners.md">The bpftrace One-Liner Tutorial</a></li><li><a title="BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more" rel="nofollow" href="https://github.com/iovisor/bcc">BCC - Tools for BPF-based Linux IO analysis, networking, monitoring, and more</a> &mdash; BCC is a toolkit for creating efficient kernel tracing and manipulation programs, and includes several useful tools and examples.</li><li><a title="Linux eBPF Tracing Tools" rel="nofollow" href="http://www.brendangregg.com/ebpf.html">Linux eBPF Tracing Tools</a> &mdash; This page shows examples of performance analysis tools using enhancements to BPF (Berkeley Packet Filter) which were added to the Linux 4.x series kernels, allowing BPF to do much more than just filtering packets. These enhancements allow custom analysis programs to be executed on Linux dynamic tracing, static tracing, and profiling events.</li><li><a title="eBPF Vulnerability (CVE-2017-16995): When the Doorman Becomes the Backdoor" rel="nofollow" href="https://blog.aquasec.com/ebpf-vulnerability-cve-2017-16995-when-the-doorman-becomes-the-backdoor">eBPF Vulnerability (CVE-2017-16995): When the Doorman Becomes the Backdoor</a></li><li><a title="Ultimate Plumber" rel="nofollow" href="https://github.com/akavel/up">Ultimate Plumber</a> &mdash; Ultimate Plumber is a tool for writing Linux pipes with instant live preview
</li><li><a title="BSD Now 073: Pipe Dreams" rel="nofollow" href="http://www.bsdnow.tv/episodes/2015_01_21-pipe_dreams">BSD Now 073: Pipe Dreams</a> &mdash; Interview w/ David Maxwell about Pipecut, text processing, and commandline wizardry.</li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
