@roland.zone
📤 1356
📥 142
📝 108
go (the language) security team lead 🔥💻🔥
uuid was a mistake
16 days ago
3
18
0
i'm sorry, i have zero interesting in consuming a "companion podcast", i'd like to watch your slop tv show, derive my own opinions, and then immediately forget everything about it 30 minutes later
21 days ago
0
3
0
did something very silly, may have some at gophercon this year if you ever sent us a vulnerability report or contributed to Go crypto (or are just nice to me) thanks to
@ljamesart.bsky.social
who did the great art!
about 1 month ago
5
80
5
genuine question: why are the HTTPS page load numbers so much lower on Linux? is it really just people doing local development, or is there some other weird thing causing this?
transparencyreport.google.com/https/overview
loading . . .
Google Transparency Report
https://transparencyreport.google.com/https/overview
2 months ago
1
3
0
excited to see RFC 8738 actually being used!
letsencrypt.org/2026/01/15/6...
loading . . .
6-day and IP Address Certificates are Generally Available
Short-lived and IP address certificates are now generally available from Let’s Encrypt. These certificates are valid for 160 hours, just over six days. In order to get a short-lived certificate subscr...
https://letsencrypt.org/2026/01/15/6day-and-ip-general-availability
3 months ago
0
6
0
4 months ago
0
3
0
things can actually maybe be good, it turns out
5 months ago
0
2
0
i have opinions about the ffmpeg security thing but i'm not going to post them, for my own sanity (but i am posting about not posting about it)
5 months ago
1
4
0
go… birds?
5 months ago
1
0
0
trying to come up with a silly toy cryptology problem for something
5 months ago
0
2
0
genuinely confused why people are so interested in this, but hey whatever
6 months ago
3
16
0
I did a talk at the UK GopherCon last month about what my team does, and I only let my laptop fall asleep twice!
www.youtube.com/watch?v=oLtq...
loading . . .
Go Security – Past, Present, and Future - Roland Shoemaker
YouTube video by GopherCon UK
https://www.youtube.com/watch?v=oLtq2sKxjto
7 months ago
1
20
9
reposted by
Go
7 months ago
Hi folks, it’s survey time! We’d love to learn more about how you use Go and what could be improved. Share your feedback via our annual developer survey at
google.qualtrics.com/jfe/form/SV_...
. It should take 10 - 20 minutes to complete, and will be open through September 30. Thank you!
#golang
loading . . .
Go Developer Survey 2025
Share your feedback about developing software with Go.
https://google.qualtrics.com/jfe/form/SV_3wwSstC8vv4Ymkm?s=at
0
58
31
I recently passed my 5 year anniversary at Google on the Go team (thanks to them for reminding me), which also means it's been about 10 years since I first joined the Let's Encrypt team. It's been amazing to see the projects grow over those years, and I couldn't be prouder to have worked on them.
7 months ago
1
20
1
we lived
7 months ago
0
31
1
signs you’re having a real normal one
8 months ago
1
5
0
a true rarity
add a skeleton here at some point
8 months ago
0
6
0
explaining post tour criteriums to non-cycling people makes you sound fully insane
8 months ago
1
2
0
add a skeleton here at some point
9 months ago
0
8
0
😐
9 months ago
0
1
0
I don't think they post here, but excited to be talking about what the Go Security team does, and why (hopefully) you don't hear much about us, at GopherCon UK in August.
9 months ago
2
35
7
reposted by
Filippo Valsorda
10 months ago
Here's something I am very excited about: Photosynthesis! 🌱☀️ A proposal to have CAs run transparency logs and make X.509 certificates out of Merkle Tree inclusion proofs. This is similar to how CT would have worked in an ideal world, and it solves the problem of PQC sizes in logs and handshakes.
loading . . .
[TLS] Photosynthesis, an update to Merkle Tree Certificates
Photosynthesis combines the Static CT API with the ideas in Merkle Tree Certificates.
https://mailarchive.ietf.org/arch/msg/tls/6jqhUVz58s4ZgsZ8HvuZftncT9A/
1
40
12
what a successful go tree freeze day looks like
11 months ago
1
18
1
i wrote a post about a thing we did with go, it was cool and good
go.dev/blog/tob-cry...
loading . . .
Go Cryptography Security Audit - The Go Programming Language
Go's cryptography libraries underwent an audit by Trail of Bits.
https://go.dev/blog/tob-crypto-audit
11 months ago
1
29
6
i swear to god amazon does this shit just so they can say they'll deliver stuff quickly and then they're just like ohhh no oopsie we scanned it as delivered two days early our bad
about 1 year ago
0
2
0
the democrats do not give a shit, they're just capitulating on everything
about 1 year ago
1
1
0
do you have games on your phone
about 1 year ago
0
10
0
I suspect "I'm gonna open source it on a Chinese server" is going to be a permanent addition to my lexicon
add a skeleton here at some point
about 1 year ago
0
3
0
i choose to believe this is performance art
github.com/openssl/open...
loading . . .
How Does OpenSSL Handle Arbitrary Code Embedded in Certificates? · openssl openssl · Discussion #26890
I have a question for the OpenSSL community regarding the inclusion of arbitrary code within a certificate and its effects on the resulting output. Specifically, I am concerned about the behavior o...
https://github.com/openssl/openssl/discussions/26890
about 1 year ago
4
1
1
go birds
about 1 year ago
0
1
0
very cool to see the team continuing to push boulder to new heights, I don’t think any of us could’ve predicted it’d be responsible for issuing millions of certs a day in 2015
letsencrypt.org/2025/01/30/s...
loading . . .
Scaling Our Rate Limits to Prepare for a Billion Active Certificates
Let’s Encrypt protects a vast portion of the Web by providing TLS certificates to over 550 million websites—a figure that has grown by 42% in the last year alone. We currently issue over 340,000...
https://letsencrypt.org/2025/01/30/scaling-rate-limits/
about 1 year ago
0
18
0
getting faded off that NIST Reference Material 8210
shop.nist.gov/ccrz__Produc...
loading . . .
https://shop.nist.gov/ccrz__ProductDetails?sku=8210
about 1 year ago
0
0
0
about 1 year ago
0
5
0
about 1 year ago
1
1
0
perhaps slightly jumping the gun here, but excited to see support for this finally getting rolled out
github.com/letsencrypt/...
loading . . .
Blog Post: Announcing Six Day and IP Address Certificate Options in 2025 by scottmakestech · Pull Request #1814 · letsencrypt/website
Let's Encrypt Website and Documentation. Contribute to letsencrypt/website development by creating an account on GitHub.
https://github.com/letsencrypt/website/pull/1814/files
about 1 year ago
1
2
0
the number of xiaohongshu screenshots people are posting of comments they think are from people in china marked "美国" is extremely funny
about 1 year ago
0
3
0
nice
add a skeleton here at some point
about 1 year ago
0
1
0
“people familiar with the matter” doing so much heavy lifting, china allowing a technology transfer here seems so incredibly implausible
add a skeleton here at some point
about 1 year ago
1
2
0
where did i get this? i have zero memory of its origin
about 1 year ago
2
10
3
i've been thinking about writing a blog post about the Go Security team approach to (lack of) severity labeling for vulnerabilities, probably with an aside about the (non) utility of CVSS scores. would people actually find this useful/interesting, or would i just be posting into the security void
over 1 year ago
3
27
0
seems pretty cool tbh
add a skeleton here at some point
over 1 year ago
0
2
0
reposted by
Filippo Valsorda
over 1 year ago
6
1111
218
uh huh
over 1 year ago
2
3
0
good stuff in here, please make sure we didn't completely break anything
add a skeleton here at some point
over 1 year ago
0
12
1
i can’t believe they milkshake duck’d the tsunami
over 1 year ago
0
3
0
something i often here from people that is "missing" from go is enums, buts its often unclear why they think they are necessary. most of the time it boils down to wanting enforced exhaustive type switch cases ("match" in some other languages), but is that really it?
over 1 year ago
4
3
0
90% of election analysis boils down to "here is this position i personally dislike/like, it was the only reason this person lost/won, i am very smart"
over 1 year ago
0
4
0
i’m like 90% sure the reddit person is referring to lunch ninja, a program which sets up cross org lunches so you can talk to people you don’t generally work with. poses a lot of questions about their general understanding of normal human interactions 🫡
add a skeleton here at some point
over 1 year ago
2
8
0
the three big things i worked on for go 1.24 from least cursed to most cursed: * a dit API & runtime mode (minorly cursed) * server-side ECH support for TLS (moderately cursed) * x509 policy validation (unbelievably cursed)
over 1 year ago
0
16
4
every six months i swear i won't put off major feature work until the last week of the go dev cycle and i have never learnt my lesson
over 1 year ago
1
17
2
Load more
feeds!
log in