Come next week, I'll have been blogging for 20 years - significantly over half my life. Over that time, a lot has changed on the Web, in the world, and for me: how has my blog (and my blogging) adapted?https://danq.me/2018/10/08/20-years-of-blogging/
This weekend, I attended part of Oxford's first ever IndieWebCamp! As a long (long, long) time proponent of IndieWeb philosophy (since long before anybody said "IndieWeb", at least) I've got my personal web presence pretty-well sorted out. Still, I loved the idea of attending and pushing some ofhttps://danq.me/2018/09/23/indiewebcamp-oxford/
As an ocassional geocacher and geohasher, I'm encouraged to post logs describing my adventures, and each major provider wants me to post my logs into their silo (see e.g. my logs on geocaching.com, on opencache.uk, and on the geohashing wiki). But as a believer in the ideals behind thehttps://danq.me/2018/09/16/importing-geocaching-logs-into-wordpress/
I've generally been pretty defensive of Microsoft Edge, the default web browser in Windows 10. Unlike its much-mocked predecessor Internet Explorer, Edge is fast, clean, modern, and boasts good standards-compliance: all of the things that Internet Explorer infamously failed at! I was genuinelyhttps://danq.me/2018/09/05/edge-security-fail/
Earlier this year I found a mystery cable. But today, I've got an even bigger mystery. What the hell is this?
I found it in a meeting room at work, tucked away in a corner. Aside from the power cord, there are no obvious interfaces to it.
My best bet is that it's some kind ofhttps://danq.me/2018/08/22/the-mystery-button-box/
I'm a moderately-keen geohasher, as you might be aware if you follow my geohashing logs or you saw that video of me going 'hashing earlier this month.
For those that don't know, the skinny version is this: in May 2008 an XKCD comic was published proposing (or at least joking about) a new gamehttps://danq.me/2018/08/21/graticule-water-coverage-calculator/
Mostly for my own benefit, as most other guides online are outdated, here's my set-up for intercepting TLS-encrypted communications from an emulated Android device (in Android Emulator) using Fiddler. This is useful if you want to debug, audit, reverse-engineer, or evaluate the security of anhttps://danq.me/2018/08/07/android-emulator-https-intercept/
Do you remember Challenge Anneka? It aired during the late 1980s and early 1990s and basically involved TV presenter Anneka Rice being dropped off somewhere "random" and being challenged to find and help people in sort-of a treasure-trail activity; sort of a game show but with only one competitorhttps://danq.me/2018/08/01/challenge-robin/
I recently discovered a minor security vulnerability in mobile webcomic reading app Comic Chameleon, and I thought that it was interesting (and tame) enough to share as a learning example of (a) how to find security vulnerabilities in an app like this, and (b) more importantly, how to write an apphttps://danq.me/2018/07/05/comic-chameleon/