Getting Ready to Vote | Proposition 14

I’ve been putting in the time to research the many propositions Californians have on the ballot for the November 3rd election. Deciding how to use my vote has been a challenge—both sides of the propositions giving sound arguments. I’ve previously written about Proposition 22, “App-Based Drivers as Contractors and Labor Policies Initiative (2020),” and you can find that article here. In that article, I wrote that democracy isn’t easy. It hasn’t gotten easier when coming up with a decision on Proposition 14, which “authorizes bonds continuing stem cell research.” Check out the California General Election Official Voter Information Guide, where I was able to see both sides of the argument for and against Prop. 14.  



For three days this week, I hung out in Brooklyn. Before arriving in New York, I planned on fitting in as much time with my close friends and family as I possibly could. A close friend and I planned on having dinner together and spending my last night at an “Oktober Fest” event. With my childhood best friend, we planned on lunch and shooting hoops. And with my god-sister, we planned on spending an afternoon together at my mom’s house conversing and enjoying a home-cooked Jamaican dinner. 


My main priority for my trip was to spend time with my three-year-old niece and seven-year-old nephew. They haven't had many opportunities to go outside and play because of the pandemic and my goal was to change that--at least for the few days I had. 


IoT Security

OWASP has a list of the top 10 most commonly found vulnerabilities—the “OWASP Top Ten.” The OWASP site describes this list as representing “a broad consensus about the most critical security risks to web applications.” Number one on the list is Injection, the vulnerability hackers love to exploit. There’s something real cool about pulling off an injection attack. Compromising a database, getting the browser to run commands on your behalf, or gaining god-level privileges on a server. But you know what’s cooler? Getting that god-level access with a lot less work. Let me introduce number six on the top ten list—security misconfiguration. 


A security misconfiguration is exactly what it sounds like. A device that is meant to be …

First 1 2 3 4 Next Last