OggS tYz ʭ?OpusHead8 OggS tYz qOpusTags Lavf58.45.100 language=deu handler_name=SoundHandler encoder=Lavc58.91.100 libopus major_brand=isom minor_version=512" compatible_brands=isomiso2avc1mp41 author=Fefe genre=lecture title=Writing secure softwareQ copyright=Licensed to the public under http://creativecommons.org/licenses/by/4.0 album=37C3 artist=Fefe6 description=I have previously given talks about security principles and approaches like Least Privilege, TCB Minimization, and Self Sandboxing. The most frequent feedback has been "I don't know how to apply this in practice". So, in this talk, I will show how I applied those principles in a real-world software project: a CRUD web app. My blog. I introduced dangerous attack surface on purpose so I could some day give a talk about how to apply these techniques to reduce risk. This is that talk. I will also introduce the concept of append-only data storage.OggS tYz ay;.,.#%! :qw%!O ^i@A9*SyrtGcn7dNCw0mi~D-sxj52p@n]?W2Yw{'XmkM^iN>u&N`5)CRB4< v3b[nVTVJ80yFwSKZ d#%8ud`\d#ƈ(d G 7 E ȫ2' sP *%&<#k]+0P3YK=;@:D@,`F과w[0ѣh(8ș!rGU9>BI4s 7(qW3wKFs.SkK9e&CB3+FmzM C`oab5#+8[м.\p1#P=^.%L閘d9g5jee˔3- $}Ǟ(Twc(>'*=Fv ͌ıɗGz/jۥا%}R F.?m3kΝszϜr''vvhl){AT }' ɿ]7:zlIq'Z#eD{$6 TbeFq;{B{o0 /0Þ%CE It >-2A4:U qzF6k{M2r)Pz.ܥaT4N5}heǩ8w;UQ<0go,PIYDYs$-0*5Ms&YiUN\{ יH3 Ěa