Newsletter 60 – 02/2025

Featured

Boring tech is mature, not old – Boring technologies are the ones with a mature eco system, with solid practices, libraries and developers, this kind of technologies are the best because they solve problems (and were paid to solve them). Being boring doesnt mean that it is old.

Everyone knows your location – tracking myself down through in-app ads – An alarming post showing how easy it is to find location (and other) information about anyone on the internet.

Developer philosophy – As you become more senior, you start developing your own philosophy around development, believing in and following rules that you’ve seen value in over time and you don’t give up on applying them in your day job. This post is about some of those rules.

MISC

Go Supply Chain Attack: Malicious Package Exploits Go Module Proxy Caching for Persistence – Malicious package exploits are always a threat in any language ecosystem. This one specifically affects Golang and a package related to BoltDB. The post highlights the importance of checking the packages you’re importing into your code (especially in the age of Copilot).

Scaling Our Rate Limits to Prepare for a Billion Active Certificates – A great post by the Let’s Encrypt team about how they migrated their rate limit system to handle their load, using Redis and the GCRA algorithm.

How engineering teams can thrive in 2025 – The daily work and relationships of software engineers are changing rapidly due to emerging AI technologies. 2025 will be a year of significant changes in how we work.

How I use LLMs as a staff engineer – As AI developer tools become the industry standard, it’s important to observe and learn from various developers’ workflows with them. This post seems very similar to my current workflow and usage of various tools.

When Imperfect Systems are Good, Actually: Bluesky’s Lossy Timelines – Sometimes, imperfect systems are actually good. This fascinating story by the Bluesky team tells us the history of one such system.