tracing
Dynatrace Brings Observability to Security Analytics
Dynatrace added a security analytics offering based on its observability platform for discovering the root cause of application performance issues ...
Orca Security Traces Cloud Vulnerabilities Back to Code
Orca Security today announced it added an ability to trace cloud security risks in production environments back to both the original code that created the issue and the developer that wrote it ...
De-anonymizing Bitcoin
Andy Greenberg wrote a long article — an excerpt from his new book — on how law enforcement de-anonymized bitcoin transactions to take down a global child porn ring. Within a few ...
Building, Tracing, and Monitoring Event-Driven Architectures on Google PubSub and BigQuery
The use of distributed systems is increasing day by day. This makes communication between systems important more than ever. In this article, we examine event-based communication between these systems. And we present ...
Profiled Tracing for AWS Lambda Invocations
Imagine a complex distributed system with lots of API calls, messaging transactions, and database operations. Having a complex system brings its own complex problems on observing the overall performance of resources used ...
Platform-agnostic Tracing
Microservice applications typically consists of interconnected systems with compute, store, messaging components that work together to dispatch requests coming to the software. For example, a modern e-commerce application today includes an order ...
Me on COVID-19 Contact Tracing Apps
I was quoted in BuzzFeed: "My problem with contact tracing apps is that they have absolutely no value," Bruce Schneier, a privacy expert and fellow at the Berkman Klein Center for Internet ...
Contact Tracing COVID-19 Infections via Smartphone Apps
Google and Apple have announced a joint project to create a privacy-preserving COVID-19 contact tracing app. (Details, such as we have them, are here.) It's similar to the app being developed at ...
Tracing Stolen Bitcoin
Ross Anderson has a really interesting paper on tracing stolen bitcoin. From a blog post: Previous attempts to track tainted coins had used either the "poison" or the "haircut" method. Suppose I ...