/Hack

PySkyWiFi: Completely Free, Unbelievably Stupid Wi-Fi On Long-Haul Flights

- Robert Heaton tl;dr: “Here’s the basic idea: suppose that I logged into my airmiles account and updated my name. If you were also logged in to my account then you could read my new name, from the ground. You could update it again, and I could read your new value. If we kept doing this then the name field of my airmiles account could serve as a tunnel through the airplane’s wi-fi firewall to the real world.”

featured in #532


How Levels.fyi Scaled To Millions Of Users With Google Sheets As A Backend

- Dushyant Sabharwal tl;dr: Through this blog post we will be sharing our strategy and learnings on building a dynamic site without a database and an API server." The team at Levels.fyi guide us on how they achieved product market fit before moving to more robust solutions.

featured in #389


Improving Firefox Stability With This One Weird Trick

- Gabriele Svelto tl;dr: "In some cases, Firefox could handle the failed allocation, but in most cases, there is no sensible or safe way to handle the error and it would need to crash in a controlled way… but what if we could recover from this situation instead? Windows automatically resizes the swap file when it’s almost full, increasing the amount of commit space available. Could we use this to our advantage?"

featured in #384


How To Completely Own An Airline In 3 Easy Steps

- Maia Arson Crimew tl;dr: "I had trip sheets for every flight, the potential to access every flight plan ever, a whole bunch of image attachments to bookings for reimbursement flights containing yet again more PII, airplane maintenance data, you name it. I had owned them completely in less than a day, with pretty much no skill required besides the patience to sift through hundreds of results".

featured in #382


How I Hacked My Car

tl;dr: "The IVI (In-Vehicle Infotainment) in the car, like many things these days, is just a computer. My goal was to hack the IVI to get root access and hopefully be able to run my own software on it. Of course, the first step in hacking a device like this is research." 

featured in #344