Twitter | Search | |
This is the legacy version of twitter.com. We will be shutting it down on 15 December 2020. Please switch to a supported browser or device. You can see a list of supported browsers in our Help Center.
Suhail
New: , Founder Pizzatarian, programmer, & music maker
5,888
Tweets
388
Following
64,698
Followers
Tweets
Suhail 5h
Replying to @safaiyeh @jasoncitron
Lol, same
Reply Retweet Like
Suhail 6h
Replying to @Karanjassar
Oh, I don't know. I'd like to wait till I've had a chance to play with it to make an informed opinion. One day today's version of the M1 will be slow but Mighty won't be. We can update our computers any time we want. Buying a $1K computer every 1-2 years is a bit pricey.
Reply Retweet Like
Suhail 6h
The chip wars begin:
Reply Retweet Like
Suhail retweeted
Oliver Cameron 7h
Remember what it was like to watch movies or TV shows before streaming? Such a horrible experience, with hindsight. feels the same for browsing the web, and just as revolutionary.
Reply Retweet Like
Suhail 7h
Replying to @soorajchandran_
Already written about:
Reply Retweet Like
Suhail 7h
Replying to @claudioguglieri @jack
Jack is into fashion and this whole thing is a super amazing vibe. I see you .
Reply Retweet Like
Suhail 7h
Replying to @Suhail
If you want to demoralize yourself: build a landing page, put it on Reddit, and watch the mods smack it down for self-promo while all the comments hate on you. Just build it.
Reply Retweet Like
Suhail 7h
Stop overthinking it. Talk to users, build it, and see what happens! You cannot landing page test your way into a great product with a great market.
Reply Retweet Like
Suhail 8h
That said, in the case of Mighty, we wouldn't want people to have temporary access to the host and steal long-lived tokens. "Hey, does my website work?" is a little more analogous for us.
Reply Retweet Like
Suhail 8h
In fairness, the long-living tokens are stored client-side most of the time so that hack is possible regardless of short-lived ones.
Reply Retweet Like
Suhail 10h
Replying to @scotwingo
Yeah, I understand it's value in the "I want to give you temporary access" but you'd also want to revoke it on-demand in that case usually so I think it's less practical.
Reply Retweet Like
Suhail 10h
Replying to @Suhail
I can buy that the best rationale for short-lived tokens is that there's a moment where the token gets hacked but not again and it would reduce your exposure in the case where you don't realize you're getting hacked.
Reply Retweet Like
Suhail 10h
Replying to @eyupitssam
Reply Retweet Like
Suhail 10h
Replying to @goelrohan6
Reply Retweet Like
Suhail 10h
Replying to @arvindamirtaa
500ms less latency because we have to verify the short-lived ones client/host.
Reply Retweet Like
Suhail 11h
Replying to @anshublog @a2d2
What's a real-world scenario where I got a short-lived token but then couldn't get another one?
Reply Retweet Like
Suhail 11h
Replying to @arvindamirtaa
If you found a way to get short-lived tokens and the company didn't patch the vuln, how would that stop the exposure? You could just keep getting short-lived tokens.
Reply Retweet Like
Suhail 11h
What is the best example of why one should use short lived auth tokens vs sending long-lived refresh tokens for authentication? We're struggling to see a good reason to not use long-lived ones. If we got hacked, we'd just revoke them all regardless of short-lived vs long-lived.
Reply Retweet Like
Suhail 14h
If you can’t find any users for your idea often the first thing you can do to find some is be even more specific about the use-case it works best for. Do it even if it means the market is small because a small market is better than no market. You can often widen it later.
Reply Retweet Like
Suhail 15h
“The crucial feature of the initial market is that it exist. That may seem like an obvious point, but the lack of it is the biggest flaw in most startup ideas. There have to be some people who want what you're building right now [...] that they're willing to use it, bugs & all.”
Reply Retweet Like