Some TODOs for the new site As I prepare to make this new version of dzombak.com live, I wanted to make a note of some things that are left for me to do.
Know Your Birds: Red-Headed Woodpecker The Red-Headed Woodpecker is, at least here in Michigan, a commonly misidentified bird.
A migration to Ghost from Jekyll I just want somewhere I can quickly & easily share things. So, I'm testing out what a new iteration of dzombak.com may look like, running a self-hosted instance of the Ghost CMS.
Parent-Child Communication in a Coordinator/View Model Application I received an interesting question via Twitter last week: @cdzombak In the coordinator/MVVM architecture you described on @fatalerrorfm, how do ParentVC communicate with childVC. PC->PVM->Cord->CVM? — Cory Sullivan (@jcsully98) January 12, 2017 It took me a few days to find the time to write …
Why Comcast injecting messages into web traffic is dangerous Comcast’s practice of messaging customers via content injection provides a beautiful vector for successful phishing attacks.
The hard problem in decentralized social networks “All that matters is signed data” means that your keys become your identity, and that you manage your social network by curating your collection of public keys. Nobody has come up with a really approachable, usable way of doing that.
Let’s Encrypt vs. iTunes: anatomy of an error delivering Fatal Error iTunes appears to use Java to fetch podcast feeds, which doesn't trust the root certificate for Let’s Encrypt, the certificate authority Squarespace uses to serve sites via HTTPS.
Over-Reactive? Complex data flows, especially in an asynchronous environment, _are_ complicated and hard; maybe the problem is _there_, not in a tool designed to help model and reason about them in a formal manner.
A brief index of many neat Ann Arbor things An adaptation of an email I wrote tonight to a friend who recently moved to town. It’s not a complete index of everything that’s fun or cool in Ann Arbor, and it’s heavily oriented around our particular interests, but it’s a start.
Ad networks in their current incarnation are too dangerous to be allowed to exist. They work fine for their intended purpose (that is, delivering mediocre advertisements and tracking you across the web), but more importantly they’re very effective at distributing malware, quickly, to _lots_ of people.
Modeling polymorphic relationships in Swift (spoiler: enums seem pretty cool) In traditional Objective-C code, we’d typically use protocols to express a polymorphic relationship. In Swift, we can take advantage of the language’s powerful enumerations to model these relationships, eliminate runtime type checks, and remove room for error in client code.
App Transport Security: What, Why, How? In this talk, I answer all your questions about App Transport Security: What is it? Why does it matter? How do you make your server compatible with it, and how do you configure your app to talk to non-compliant servers? Which other apps are using ATS?
Ad-light, Malware-heavy Forbes has been running an anti-adblocking experiment which completely misses the point—and serves malware as a bonus.