>>Migrated stored user passwords to a safer format (from salted sha1 to bcrypt).
I'm curious on how to do that? I'm guessing you add another field and wait for the user to log in and if it matches, you salt and hash the new password field with the new function.
You can do that, but it has the problem that until the user logs in, the password is in a dangerous form. If you bcrypt the salted SHA1ed form, though, you increase complexity slightly but get a complete conversion immediately.
So did you not do any work on marketing Pinboard in 2011 or is this a list of only the technical stuff? I know your blogging is some indirect marketing but I'm wondering what else you did to get more users in 2011.
I like this, I really should do the same next year as I look back and don't really have a good record of what I did when and where most of my time went. I know I've added a lot to my app this year but hard to assess whether I spent my time effectively.
I remember the FBI raid. That was when I first got truly hooked on HN. That was a really interesting read. I liked how you not only told the story of what's up as it related to the customers but also from a sys admin point of view, detailing what you had to do to get the servers and service running again. I'm glad you posted this. It's a good idea and I'm going to steal the idea if you don't mind too much.
I'm curious on how to do that? I'm guessing you add another field and wait for the user to log in and if it matches, you salt and hash the new password field with the new function.