About:

Gonçalo Valério is a software developer interested in cybersecurity and tech startups, who enjoys building tools and sharing tech insights.

Website:

Specializations:

Interests:

Cybersecurity Internet infrastructure Distributed systems Tech startups
Subscribe to RSS:
Two recommended books highlight innovation at Bell Labs and the historical factors behind Portugal's economic decline.
The post highlights how Firefox can replicate DuckDuckGo's !bangs feature through custom keyword searches, enhancing user convenience without relying on a search engine.
The post recommends lesser-known software tools that enhance productivity while advocating for the recognition of open-source creators and alternatives to mainstream applications.
The post discusses a feature of Django's ORM related to deferred constraint enforcement in PostgreSQL. It explains a scenario where integrity errors occur despite proper validation and provides a solution to defer integrity checks...
The article addresses the challenge of overriding translations from dependencies in a multilingual Django project. It explains the need for adapting translations locally and provides a method to achieve this goal.
The author checked the top 1 million websites for a security.txt file and found an increase in usage from the previous year, but the change is underwhelming. The number of domains with the file increased minimally, and there were ...
The python package index (PyPI) now supports archiving projects/packages, making it easier for users to know which packages are no longer maintained. The author decided to archive old packages that were abandoned for years, includ...
The post addresses a common issue with translations in Django, where the translated text does not show up due to the translation being marked as fuzzy. The solution is to remove the extra lines or compile with the --use-fuzzy flag...
The author shares the two books he enjoyed the most in 2024, 'Broken Money' by Lyn Alden, which discusses the history and impact of money, and 'Masters of Doom' by David Kushner, which tells the story of the people behind 'id Soft...
The author discusses their experience with running a single user Mastodon instance and the challenges of optimizing it for low traffic. They share the changes they made to reduce resource usage and costs, and recommend opting for ...
The author discusses the prevalence of spam and the various methods used to combat it, particularly focusing on the 'proof of work' mechanism. They conducted an experiment to reduce spam on their websites and found that it was suc...
Hawkpost, a tool created by Gonçalo Valério to solve the problem of insecure sharing of credentials and secrets, is now in 'maintenance only' mode. Valério started the project in 2016 and it was useful for many people, but with ch...
The text discusses the .well-known directory and its purpose, which is to designate a standard place or set of standard URIs for people or automated processes to obtain metadata about resources of the domain in question. It provid...
The author discusses the challenge of digesting the large amount of content from conferences and proposes using AI tools to extract the main teachings from videos. He describes the tools he uses and provides an example of the outp...
The post discusses different approaches to implement an atomic counter in Django to avoid race conditions. It explains three different approaches and their pros and cons.
The text discusses the weak password protection in Redis, particularly the use of SHA256 hashes for storing user passwords. It explains the limitations of this approach and suggests improvements such as adding a salt, using a more...
The text discusses the advancements in the field of Artificial Intelligence (AI) and the trend of AI tools being accessible only through the internet. The author expresses concerns about data and interactions being shared with rem...
The author discusses the security.txt spec, a standard place for security-related contacts to report vulnerabilities. They implemented it for several products and received positive results. However, only 20% of websites implement ...
The post is an early preparation for the Bitcoin Atlantis conference in Madeira, discussing the Nostr protocol and the Lightning Network. The author plans to attend the event and has set up a Nostr presence with a lightning addres...
The author discusses their preference for written content over podcasts, but acknowledges the value of podcasts for learning while training. They share their organized setup for managing and listening to podcasts using open-source...
The article discusses how to filter sensitive contents from Django's error reports and how to ensure that sensitive data doesn't reach Sentry's servers. It explains the use of decorators and scrubbing to hide sensitive information...
The article discusses Django's System Check Framework, a set of static checks for validating Django projects, and how it can be useful for detecting misconfigurations, ensuring project-specific approaches are followed, and correct...
The author created a tool called worker-planet to generate a simple webpage and an RSS feed from multiple other RSS sources. They found an OPML file containing 101 infosec related sources and used a python script to extract the va...
The author reflects on the books he enjoyed the most in 2023, 'The founders' by Jimmy Soni and 'On Writing' by Stephen King. He discusses the impact of these books on his life and work.