IT Untold
Subscribe
Sign in
Home
Notes
Archive
About
Latest
Top
Discussions
The hard part I skipped: Passkeys Cryptography
Understanding elliptic curves, signatures, and challenges (with visual help)
Oct 24
•
Riccardo Causo
7
Passkeys Explained: The Future of Passwordless Authentication
Discover how passkeys replace passwords with secure, phishing-resistant authentication using WebAuthn and FIDO2. Learn practical implementation tips and…
Oct 22
•
Riccardo Causo
4
2
September 2025
Can we look into MCP for real?
A deep dive under the hood of MCP, the most discussed protocol of 2025
Sep 30
•
Riccardo Causo
Why I Can't Stop Digging
What happens when you need to build the tools that build the tools
Sep 15
•
Riccardo Causo
2
Another kind of IT Untold
Why I Stopped Writing (And Why I'm Back)
Sep 6
•
Riccardo Causo
5
2
May 2025
When Time Is Short, Choose Boring Tech
The case against bleeding-edge frameworks and tech gunslinging when delivery speed matters more than novelty.
May 11
•
Riccardo Causo
7
April 2025
False promises fatigue
From AI miracles to snake oil seller
Apr 24
•
Riccardo Causo
9
1
Threat Modeling as a Design Practice
Threat modeling isn’t a security checklist.
Apr 11
•
Riccardo Causo
11
Infrastructure as Code: A Practical Approach
Before continuing with the Key Concept of system desing we need to talk about infrastructure
Apr 1
•
Riccardo Causo
7
1
March 2025
Is lazy loading really lazy?
A deep dive into Suppliers in Java
Mar 23
•
Riccardo Causo
8
1
Java 24 special edition
I'm a Java guy, I cannot miss this one
Mar 18
•
Riccardo Causo
3
Beyond Documentation: The Art of Technical Writing for Engineers
How to craft insightful, engaging, and valuable tech content that resonates with a wider audience.
Mar 16
•
Riccardo Causo
6
1
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts