Sorin Curescu

1.3K posts

Sorin Curescu banner
Sorin Curescu

Sorin Curescu

@en3sis

Founder & CTO at @vortrius | building @cuplido_app • I do things with code.

Katılım Aralık 2009
372 Takip Edilen830 Takipçiler
Anicet
Anicet@AniC_dev·
@en3sis @amgauge it obviously is not but he should be leaving for openai obviously
English
1
0
1
102
Anicet
Anicet@AniC_dev·
honestly he should resign
Anicet tweet media
English
98
9
824
293.8K
Sorin Curescu
Sorin Curescu@en3sis·
@AniC_dev @amgauge Do you really think that’s Boris’ decisions? It’s sad to see that the backlash lands on them for being the one active in X.
English
1
0
1
148
Anicet
Anicet@AniC_dev·
@amgauge letting people build on top of your things then changing the rules so heavily is bad but that'd be okay, what's really not okay and trust breaking is the misleading way they communicated it, making it look like a value increase when its a net value decrease
English
1
0
4
7.1K
Sorin Curescu
Sorin Curescu@en3sis·
@letstri Do you think we can have @conar_app show the tagged environment so "upsis" are easier to avoid? Please? UWU PD: I would make the whole page/sidebar red for production 😈
Sorin Curescu tweet media
English
1
0
1
22
Bowie
Bowie@bowieoverride·
my biggest issue with hetzner @levelsio is that its not used enough, their login page has been broken for over 20 minutes and theres zero traffic on twitter, my hetzner deploys are intermittent, etc. and cloud status pages are worthless
Bowie tweet media
English
10
0
33
15.5K
Sorin Curescu
Sorin Curescu@en3sis·
I'm at the point where I have to name my fix branches with {mm}{dd}, which is sad.
Sorin Curescu tweet media
English
0
0
1
30
Sorin Curescu
Sorin Curescu@en3sis·
Spent some time on something almost nobody will notice. The tab icon and label change with the time of day. 'Today' becomes 'Tonight' after dark 👀
English
0
0
0
18
Sorin Curescu
Sorin Curescu@en3sis·
@AMD stock has just skyrocketed! Well deserved!
Sorin Curescu tweet media
English
0
0
0
5
Michel Lieben
Michel Lieben@MichLieben·
I'm giving away the Claude Code skills we use to manage $300k/mo in ad spend at ColdIQ. 4X ROAS on $1M+ spent. Ivan, our head of growth, built them off 300+ hours running ad campaigns for our clients. They run Google, Meta, and LinkedIn ads from the terminal in plain English: → bulk edits across platforms → custom audiences from CRM lists → creative fatigue detection before CTR dips → bid adjustments at scale → performance audits across periods Reply "ads" and I'll send the full repo. Must be following.
Michel Lieben tweet media
English
5.5K
364
4.1K
435.3K
Sorin Curescu
Sorin Curescu@en3sis·
@Patarino Yep, sad tbh. It has some useful things, and I did not mind paying the 100$ year for the inline completion (which is OK compared to Cursor's). They are far behind in the race
English
1
0
1
21
Sorin Curescu
Sorin Curescu@en3sis·
I was basically paying for the inline suggestions. I hoped that it would get good. Right now it's hard to justify the 100$ price :/
English
0
0
0
14
Sorin Curescu
Sorin Curescu@en3sis·
So basically Copilot Pro is now worthless?
Sorin Curescu tweet media
English
1
0
0
45
Feross
Feross@feross·
❤️ "The reason this incident got caught quickly, the reason Socket was able to produce a technical analysis within hours, and the reason Checkmarx’s response could move in parallel with ours, is that all three teams shared signals and samples in real time."
Docker@Docker

We recently caught a malicious image pushed to Checkmarx/KICS on Docker Hub using stolen creds. We coordinated a response with @SocketSecurity and @Checkmarx. Read more on what happened, and why fast, open collaboration is the only way to shorten these windows → bit.ly/4mK4xWe

English
5
16
186
25.6K
Sorin Curescu
Sorin Curescu@en3sis·
@mehulmpt @feross Same. At this point it’s not a matter of “if”, it’s a matter of “when”. Every-single-day!
English
0
1
3
1.3K
Paul Moore - Security Consultant 
Bypassing the #EU #ageVerification app - part 2. This time, it's v2026.04-2 - which won't run on rooted devices & has encrypted shared preferences. If we ignore the fact they've used a 6 year old deprecated library, they haven't actually solved the problem at all. An attacker can just as easily delete ciphertext as plain text. Ironically, they've tried to solve a problem they don't truly understand... much like the concept itself.
Paul Moore - Security Consultant @Paul_Reviews

The @EU_Commission has released an update to patch out the issues I raised last week, v2026.04-2 (#release-notes_1" target="_blank" rel="nofollow noopener">ageverification.dev/releases/#rele…) Honestly, I don't know if I should laugh or cry. Let's review each one: 1. On-device data: database and settings encrypted at rest, with keys protected by the device’s hardware-backed key store. Sounds great, until you look closer. They introduced androidx.security:security-crypto, deprecated in 2025. Also androidx.security.crypto.EncryptedSharedPreferences, deprecated in 2025. Finally, androidx.security.crypto.MasterKeys, which were deprecated in 2020. 3 deprecated dependencies introduced following criticism over weak security. These weren't left over and missed during an update... they've added them now to "harden security". Remember, this isn't an isolated app. It's intended to lay the foundation for many production applications; all using deprecated security libraries from the outset. Worse, they already correctly use KeystoreController in their codebase. The correct answer already existed and they still got it wrong. 2. Runtime: the app checks device integrity on startup and refuses to run on rooted or jailbroken devices. Production deployments should complement it with stronger device-attestation mechanisms appropriate to their infrastructure and compliance requirements. They check for su, check package manager for root apps, run "which su" and checks if it's a custom ROM. Paths: /system/bin/su /system/xbin/su /sbin/su /system/su /data/local/su /data/local/bin/su /data/local/xbin/su /system/app/Superuser.apk /system/app/SuperSU.apk Great... in 2015. These are all trivially bypassed in 2026. 3. Passport onboarding: more stable scanning; the passport photo is stored privately and deleted as soon as it’s no longer needed. They're still not encrypted, so I'm not sure what "privately" means - but they are deleted correctly now. 4. PIN: stricter rules block easy-to-guess PINs; PINs are salted and hashed, never stored in plain form. They salt correctly (a true CSPRNG), then use PBKDF2-SHA256 - which is outdated and only recommended where FIPS compliance is required, which doesn't apply here. To make matters worse, they use just 210,000 iterations. For those of a NISTy disposition, you're likely already shaking your head. 210,000 seems oddly specific. It is. It's the @owasp minimum for PBKDF2-SHA512, not SHA256. Right number, wrong algorithm. In reality, OWASP recommended 600,000 iterations as a minimum in 2023. Worse still, 600,000 is the baseline minimum for passwords, not PINs with 1 million permutations. You could use 1B iterations, you're not measurably increasing security when there are so few attempts required to break it. At the very least, use a modern hash with reasonable brute-force resistance against a 2026 threat model. All this... cited as a "first hardening step". Again, utter security theatre. None of this negates my fundamental point. This isn't fixable through code - it's fundamentally ill-conceived and poorly implemented.

English
38
297
1.2K
69.7K