

Topic: Many of us have tried to imagine ourselves in the hit show "Squid Game" and have wondered how far we get. We also run A/B testing to analyze our layout effectiveness, and we run all of this using a Firebase Remote Config.

We deliver changes to the app while it's in production and without a release procedure. Topic: I'll discuss our work to provide dynamic layouts for payments in the client app. We'll be touching on issues and experiences here at Nord Security, as well as cases faced by database admins at other leading tech companies. Topic: I will be raising questions about building a database platform that works all day and all night for all kinds of tasks, whether real or imagined. Role: Senior database admin at Nord Security We learned a lot while tackling this challenge, so I would like to share that experience with you today. It was challenging to optimize Anycast on a global scale because of how the internet works. At that time, NordVPN had its DNS infrastructure built on Anycast but offered a suboptimal user experience in certain cases. Topic: Optimizing for the Anycast network was one of the very first tasks I had to work on when I joined NordVPN. Role: Network engineering team lead at NordVPN I'll discuss some of the unique challenges we're facing and some of the most promising tools we're looking at to implement these new functionalities. The next big step is a feature to jeopardize device fingerprinting. We're doing lots of work to expand it, including defense against tracking cookies. Topic: In my presentation, I'll be discussing how we implement our Threat Protection feature and how it blocks ads, trackers, and malicious websites on the user's device. We'll also cover some of the setbacks and challenges we've experienced along the way, how we've dealt with them, and what lessons we've learned. That includes what our statistics infrastructure looks like today, what kind of tools we use, and how we're moving forward with statistics infrastructure 2.0. Topic: I'll be discussing our statistics infrastructure at Nord Security. Role: SRE engineer at the Nord Security infrastructure team In this presentation, I discuss the pitfalls in various approaches we've tried with Consul, the limitations we have discovered, and how Consul prevented us from abusing it and forced us to do things "the Consul way". Those requirements have led us to attempt to use Consul in non-standard ways, but Consul is reasonably opinionated in how it allows itself to be abused. However, due to the specific nature of VPN servers, we have some quite unusual requirements and ways of doing things. Topic: Satellite Infrastructure introduces a Consul as a layer to manage data synchronization and service discovery on VPN servers. Role: Satellite SRE infrastructure team lead at NordVPN We cover the user experience hell those false positives create for legitimate projects and how developers can help overcome this challenge. Some vendors' approaches result in large streams of false positives and mislabelling. How, then, does the antivirus industry handle their widespread use? The answer: it hardly does.ĭuring this presentation, I will review the most popular antivirus engines and how they analyze packed files. It is a very popular technology – some statistics show that more than 80% of modern malware is packed with at least one packer.
CODE REDUCTION NORDPASS SOFTWARE
Topic: Packing is a code obfuscation technique used broadly by both legitimate software developers and malicious actors. As with all software, migration to newer tools requires investment, and I'm here to tell you: outdated tools are a pain to maintain and eat up your developers' precious time. One of the tools we currently use for PHP projects is a very outdated package manager. Unfortunately, that also means I am the go-to person when old tools break down. I dedicate my spare time to finding and creating internal tools that improve our developers' workflows. Topic: Well-functioning internal tools are the key to developer happiness, and that's the main reason why it's so important to invest in them. Role: Lead software developer at Nord Security

This talk aims to rectify these misconceptions, show how exceptions can be an incredibly useful tool for error handling, and provide concrete examples and tips regarding proper exception usage. Because of this, some modern languages forego exceptions entirely instead of using error handling mechanisms that the exceptions were meant to replace in the first place. Topic: Exceptions are a powerful tool for handling errors in code, but many people perceive them as confusing and hard to use.
