Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing

Nicholas Zakas

๐Ÿ‘ค Speaker
455 total appearances

Appearances Over Time

Podcast Appearances

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

There needs to be some way to help consumers of credit cards, users of NPM to protect themselves from having their information stolen.

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

But credit cards don't just stop there.

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

They're also doing anomaly detection with each transaction that's coming through to figure out, does that look like something you would normally do?

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

And so if you've ever been traveling or just make a big purchase, you may get a text message that says, hey, we just got this charge for this amount at this location.

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

And if you say yes, it says great.

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

You know, go right ahead.

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

If it says no, then it will block the transaction and they start the fraud investigation process.

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

And in that way, they know that, hey, nobody's going to be 100% at protecting their information from being stolen for a variety of reasons.

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

So let's not just rely on that.

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

Let's also do some analysis and see if we can figure out if something bad is going on before it gets too far down the line.

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

And that's where I think that NPM has been kind of missing some clear actions that they could be taking to protect us better.

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

Well, from what I can tell, they have some ability to do this because they said in one of their blog posts that like once they identified the pattern of the credential stealing attack,

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

then they were preventing new packages from being uploading that had that same kind of signature.

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

So they do have that capability to do like a real-time analysis of packages as they're being uploaded, but it just doesn't appear that they're doing much else with that capability just because of how frequent the attacks have been.

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

Like if it was like, oh, like once a year, it's like, well, maybe like during those 11 months, you know, they were kind of tweaking some knobs and twisting some things and trying to figure stuff out.

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

But it was like every single month, another attack, almost doing the exact same thing.

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

And then, you know, later them coming in and saying, like, here's what we did to clean up the mess.

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

And I just feel like the technology is there to prevent the mess before it happens.

The Changelog: Software Development, Open Source
Securing npm is table stakes (Interview)

And for whatever reason, I'm guessing, probably lack of resourcing, that it's just not getting done.