In April, I relaunched moviegolf.com, a website I’ve operated since 2009.
Since this is one of the flashier programs I’ve written and certainly one of
the longest-lasting, I wanted to recount its history. My style of programming
has definitely shifted in the intervening years.
It’s long overdue, but… moviegolf.com is back and better than ever! Give it a try!
A quick recap of this saga: moviegolf.com is a website I created in high school to find the optimal path between two movies based on shared actors. However, in the years since, it has bit-rotted significantly. At the time, I used Freebase, which Google acquired for use in the Knowledge Graph, but shut down in 2015. Since then, the site has limped on, forever stuck with an outdated set of movies. moviegolf.com was in a deep coma with an uncertain future.
My goal in doing a rewrite was twofold: I wanted to have a Go service running in production that I understood intimately and I wanted to make the service more self-sustaining. I made an unsuccessful attempt to do this about five years ago. At the time, I was discouraged by App Engine limitations and the difficulty of acquiring data. Luckily, the data from Freebase lives on in Wikidata with a much better data crawling story, but the file formats and API are totally different. Getting the data automatically required a total rewrite of my lousy ~10 year old data ingestion pipeline. I took the opportunity to rewrite the search algorithm, storage backend, and UI while I was in there. I did scrap some features for the sake of time, but nothing that I felt was critical for the experience. I wanted to focus on the core “golf” experience. From start to finish, this took a little over a month of weekends and evenings. I’m planning on doing a write-up of the salient technical details soon, but in short: GCP rocks and simple components make for robust services.
Cyber security has become critical to ensuring public safety in the US. There’s
an absence of good coherent information, and people are rightfully scared and
confused. I’m drafting another article that explains cyber security principles
in greater depth, but it’s not ready yet. Until then, I’ll get straight to the
practical tips:
Encrypt your phone. Instructions from CNET. This protects someone from
looking at your phone’s storage without knowing the passcode. If you only
follow one step from this guide, follow this one.
Use Signal for communications. Messages and voice calls made through Signal
are encrypted such that only the two devices communicating can read the
messages. However, if you don’t encrypt your phone, then the messages can be
compromised with physical access to the phone. Encrypt your phone!
If you think you are about to be detained by police, turn off your
phone. Police can legally coerce you to touch the fingerprint scanner, but
cannot legally make you divulge a passcode (source). By turning
off your phone, your phone “forgets” the decryption key to the storage, thus
requiring the passcode on boot. If you are participating in protests or
other situations requiring elevated security, disable fingerprint scanning
for sign-in.
Be cautious of apps you install and use a phone from a reputable
manufacturer. I trust Apple and Google, but use your own discretion.
Beyond this, the usual security advice applies — don’t visit sites you don’t
trust and use HTTPS where possible. Stay safe!
Important tip for those protesting: use the Signal messaging app. SMS can be intercepted, and while I don’t know of any specific threat, prevention never hurts.
(This post started off as an email to a colleague. They asked me for feedback
on how to speed up an agreement on technical issues. Halfway through my
response, I realized the advice I was giving was broadly useful and I wanted to
write it up more thoroughly.)
So you want to write some code or do something that affects more than just you.
Great! Whenever this happens, you will face three basic challenges:
Find the stakeholders.
Explain the problem to the stakeholders.
Listen to and address concerns that the stakeholders have.
Once you’ve done all three, you’re done! The actual work is usually straightforward once your team is supporting you.