w8mej
John Menerick
Castro Valley, United States

John Menerick, a cybersecurity expert based in the San Francisco Bay Area, runs the Securesql blog, sharing insights into cyber guardianship. Involved in projects with Tor, the US Department of Defense, and AI/ML infosec, he advocates for privacy, security, and decentralized security models. Menerick's work emphasizes the importance of tech oversight in enhancing digital trust. John focuses on development of massive planetary distributed self-healing clouds.

CodersRank Score

What is this?

This represents your current experience. It calculates by analyzing your connected repositories. By measuring your skills by your code, we are creating the ranking, so you can know how good are you comparing to another developers and what you have to improve to be better

Information on how to increase score and ranking details you can find in this blog post.

2,751
CodersRank Rank
Top 1%
Top 5
HCL
HCL
Developer
United States
Top 50
Scipy
Scipy
Developer
United States
Top 5
TypeScript
TypeScript
Developer
United States
Highest experience points: 0 points,

0 activities in the last year

Add some compelling projects here to demonstrate your experience
Open Source Fairy Dust - Internet infrastructure's vulnerabilities
DEFCON
Picture this: You wake up one day, eager to check your emails, stream your favorite shows, and connect with friends on social media, but suddenly, everything comes to a screeching halt. The internet is down, and chaos ensues. What if I told you that the very systems and services powering the internet, the backbone of our digital world, are more vulnerable than you could ever imagine?

Ladies and gentlemen, the digital age we live in is under constant threat, and understanding the vulnerabilities of internet infrastructure is crucial. Join me for an eye-opening talk that will reveal the hidden flaws in the Internet's architecture and why discussing them is not just worthwhile but absolutely essential.

Real-world Impact:
Let's start with the most compelling reason - the real-world impact. Every aspect of our lives, from finance to healthcare, relies on the internet. A breach in internet infrastructure can disrupt economies, compromise personal data, and even impact national security. This talk will illustrate the magnitude of these consequences.

Vulnerability Exploitation:
Cybercriminals are constantly probing the internet for weaknesses, and they're getting smarter by the day. Understanding the vulnerabilities in internet systems and services is essential to stay one step ahead of the hackers. I will demonstrate how these vulnerabilities can be exploited and what we can do to protect ourselves.

Privacy and Surveillance:
In an age of increasing surveillance, our online privacy is at stake. Internet infrastructure vulnerabilities can be exploited to infringe upon our rights and invade our personal lives. This talk will delve into the potential for abuse and how we can safeguard our privacy.

Economic Implications:
From small businesses to large corporations, everyone depends on the internet. An attack on internet infrastructure can have devastating economic consequences. I will outline the financial risks involved and how understanding these vulnerabilities can help organizations prepare and defend against such threats.

Call to Action:
Our digital world is only as strong as its weakest link, and it's our collective responsibility to secure it. This talk is not just about fear-mongering; it's about empowering individuals, businesses, and governments to take action. I will provide practical advice on how you can contribute to a more secure internet ecosystem.

Conclusion:
In an era where our lives are increasingly intertwined with the digital realm, understanding the vulnerabilities of internet infrastructure is not just an option; it's a necessity. Join me in this enlightening and urgent talk, where we will navigate the uncharted waters of the internet's vulnerabilities, discuss their implications, and chart a course toward a safer digital future. Together, we can fortify the Internet and ensure that it remains a force for good in our lives. Don't miss out on this opportunity to be part of the solution!
Unlocking the Pandora's Box: Revealing the Hidden Insecurities of Git and Version Control Software
DEFCON
Imagine a scenario where your code, your most valuable digital assets, are exposed to malicious actors. Your entire project is compromised, and you're left helpless. What if I told you that Git and version control software, the very tools we rely on to manage our code, harbor vulnerabilities that could jeopardize your entire development process?

Ladies and gentlemen, in today's digital age, where software development is at the heart of innovation, understanding the insecurities of Git and version control software is not just valuable; it's mission-critical. Join me for a thought-provoking talk that will uncover the concealed vulnerabilities in these systems and explain why addressing them is not just beneficial but utterly indispensable.

The Devastating Domino Effect:
A single vulnerability in your version control system can lead to a cascade of disasters. This talk will illuminate how vulnerabilities in Git and version control software can result in code breaches, data leaks, and a breakdown of your development process, causing havoc in your projects and your business.

Code is King:
In the world of software development, code is everything. If your code isn't secure, nothing else matters. I will delve into the specific security vulnerabilities within Git and version control systems, shedding light on how they can be exploited, and the repercussions this can have on your codebase.

Collaboration Chaos:
Collaboration is at the core of software development, and Git is the backbone of many collaborative workflows. We'll explore how insecurities in Git and other version control systems can disrupt collaboration, potentially leading to conflicts, loss of data, and even project delays.

Regulatory Compliance:
With increasing regulations surrounding data security and privacy, it's imperative that developers understand how vulnerabilities in version control systems can lead to non-compliance. We'll discuss the legal and financial consequences of failing to secure your version control processes.

A Call to Action:
Understanding the vulnerabilities in Git and version control software is not about spreading fear, but rather about empowerment. This talk will provide actionable insights into how you can secure your development processes, mitigate risks, and ensure the integrity and confidentiality of your codebase.

Conclusion:
In the age of digital transformation, software development is the lifeblood of innovation. Yet, the very tools we rely on to manage our code can be the weak link in our security chain. Join me in this eye-opening and urgent talk as we shine a light on the hidden insecurities of Git and version control software, discuss their implications, and chart a course toward a more secure and robust software development ecosystem. Together, we can safeguard our code and pave the way for a future of secure, collaborative, and innovative software development. Don't miss this opportunity to be at the forefront of securing the foundation of your digital endeavors!
37 Signals - Unraveling critical vulnerabilities
In my analysis of Basecamp and 37 Signals, I uncovered critical vulnerabilities through a blend of expert insight and meticulous scrutiny. This process not only underscored my knack for identifying hidden risks but also my commitment to responsible disclosure, ensuring these findings were addressed securely and efficiently before posing any real-world threat. My approach to cybersecurity combines proactive risk management with ethical standards, making me the ideal partner for organizations seeking to fortify their digital defenses responsibly.
null null

ISC2
CISSP - Certified Information Systems Security Professional
US Federal Communications Commission
General class license

Jobs for you

Show all jobs
Feedback