Sources

1577 sources collected

SSL/TLS is one of those topics everyone knows is important, but very few people feel genuinely comfortable with. You know you need HTTPS, modern ciphers and valid certificates, yet the combination of protocol versions, cipher suites, browser warnings and CVE announcements can feel like a moving target. In architecture reviews and security audits we help with at dchost.com, we keep seeing the same pattern: the website itself might be well‑built, but the TLS stack is slightly outdated, misconfigured, or vulnerable in subtle ways. … - 3 The Big SSL/TLS Vulnerabilities (and What They Taught Us) - 3.1 Protocol‑Level Design Flaws - 3.2 Implementation Bugs (OpenSSL and Others) - 3.3 Cipher and Key Exchange Weaknesses - 3.4 Certificate and PKI‑Related Issues - 3.5 Downgrade and Middlebox Attacks … - **CRIME / BREACH**: Attacks on TLS compression and HTTP compression (especially with reflected secrets in responses). Mitigation: disable TLS‑level compression and carefully handle compression of responses containing secrets like CSRF tokens. - **Renegotiation attack**: An issue with how renegotiation was handled in earlier TLS versions, allowing certain man‑in‑the‑middle tricks. Fixed through protocol extensions; servers should use modern libraries that implement secure renegotiation or disable renegotiation entirely. … ### Implementation Bugs (OpenSSL and Others) - **Heartbleed (2014)**: A buffer over‑read in OpenSSL’s Heartbeat extension implementation, allowing attackers to read memory from servers or clients. The protocol itself was not broken; the specific library was. - **Lucky Thirteen, timing side‑channels**: Subtle implementation issues in CBC handling and MAC‑then‑encrypt designs. … ### Cipher and Key Exchange Weaknesses - **RC4 weaknesses**: RC4 was once popular for its speed, but statistical weaknesses made it unsafe. Browsers and standards now recommend avoiding RC4 completely. - **LOGJAM, FREAK, DROWN**: Attacks on weak Diffie‑Hellman groups, export‑grade ciphers and legacy SSLv2 support. Mitigation: remove export‑grade ciphers, use strong DH parameters or, preferably, ECDHE curves, and disable SSLv2/v3. … ### Certificate and PKI‑Related Issues - **SHA‑1 deprecation**: Older certificates signed with SHA‑1 became vulnerable to collision attacks and were phased out. Browsers now require SHA‑256 or stronger. - **Short key lengths**: RSA keys smaller than 2048 bits are no longer considered safe. - **Mis‑issuance and CA compromises**: When a certificate authority issues certificates incorrectly (or is compromised), browsers can distrust that CA or require additional checks such as Certificate Transparency. - **Weak or missing revocation**: If revocation via OCSP or CRL is not correctly configured, stolen certificates might remain usable longer than they should. Lesson learned: you must treat certificates as living assets with lifecycles, automation and monitoring – not as static files. We have discussed this in detail in our article on innovations in SSL certificate automation with ACME and DNS‑01. ### Downgrade and Middlebox Attacks Several attacks exploit the negotiation process between client and server to force them to use a weaker protocol version or cipher suite: - **Downgrade attacks**: Interfering with the handshake to make both sides believe the other only supports older versions. - **SCSV (Signaling Cipher Suite Value)**: Introduced to let clients signal that they support newer versions and avoid insecure fallback behaviours. … ### Protocol Versions - **Enable**: TLS 1.2 and TLS 1.3. - **Disable**: SSL 2.0, SSL 3.0, TLS 1.0, TLS 1.1. This strikes a balance between security and compatibility. Most clients will prefer TLS 1.3 when available, and fall back to TLS 1.2 otherwise. Only very old systems will fail, and in most real‑world scenarios, those clients are no longer a business priority or should access via alternative channels. … ## Wrapping Up: Turn TLS from a Risk into a Strength SSL/TLS protocol updates can look intimidating from the outside, but the underlying story is simple: early protocols and ciphers had weaknesses, the security community learned from them, and modern TLS 1.2/1.3 with clean cipher suites is much stronger and often faster. The main risks we still see today on customer infrastructures are not exotic: outdated protocol versions left enabled “for compatibility”, overly broad cipher lists copied from old tutorials, missing automation for certificates, and forgotten endpoints that still run legacy stacks.

12/26/2025Updated 3/27/2026

• Update dependencies to current, supported versions to avoid configuration issues. 3) Enable HTTPS for your site or service • Configure your web server or service to use SSL/TLS so that it serves pages and APIs over HTTPS. • Use platform guidance where available; most hosting environments include documented steps for enabling HTTPS. ... # Common Mistakes with Ssl/tls Despite being a well-established standard, teams still run into avoidable errors. According to top sources in search results, SSL/TLS is the standard for securing internet connections, which means misconfigurations can undercut a critical layer of protection. In my experience, most issues stem from incomplete rollouts or overlooked defaults. Common pitfalls and how to avoid them: • Not enabling HTTPS everywhere Why it happens: Teams may enable HTTPS on the homepage but leave parts of the site or API endpoints on HTTP. What to do: Map all pages and endpoints, then redirect HTTP to HTTPS across the board. Consistent encryption reduces the chance of users or applications falling back to unencrypted access. … Why it happens: Legacy configurations linger, and teams may not revisit them after platform upgrades. What to do: Prefer modern, well-supported settings. Periodically review your configuration and compare it with current platform guidance. • Incomplete testing Why it happens: Changes are pushed to production without verifying how HTTPS behaves across browsers, regions, or network types. … • Fragmented ownership Why it happens: No single owner is responsible for SSL/TLS lifecycle tasks like updates and monitoring. What to do: Assign clear responsibility and build SSL/TLS into regular maintenance routines. People also ask: • Why does my browser show a warning on a “secure” page? Even with HTTPS, mixed content or configuration issues can trigger warnings. Fix asset links and review your setup to resolve them. … • Avoid common mistakes such as partial coverage, mixed content, and ignoring warnings; these issues can undermine protection and user trust. Next steps you can take today: • Decide ownership: assign responsibility for SSL/TLS setup and maintenance. • Enable HTTPS across all public endpoints and enforce redirection from HTTP. • Run an external check and fix any mixed content or configuration issues.

1/8/2026Updated 1/14/2026

# Real-World Pitfalls in TLS Configuration Transport Layer Security (TLS) has become the first line of defense for anything that moves across the internet. Flip a switch, get a padlock in the browser bar, and you’re done—right? If only it were that simple. The reality inside security operations centers is that TLS is fraught with subtle traps that quietly chip away at the protection you think you have. The following guide walks through the most common real-world pitfalls teams encounter when configuring TLS and, more importantly, how to avoid them. ## Clinging to Yesterday’s Protocol Versions ### How It Happens Legacy load balancers, middleboxes, or even embedded IoT devices refuse to die. Someone keeps TLS 1.0 and 1.1 enabled “just in case,” and suddenly your A+ scan rating evaporates after a single Qualys or SSLLabs pass. … ### Quick Fixes Disable TLS 1.0/1.1 server-side unless there’s a documented business need and compensating control. Make TLS 1.2 the bare minimum and move to TLS 1.3 where possible; its shorter handshake also reduces latency. Keep a compatibility test matrix (modern browsers, legacy browsers, mobile apps) so deprecations don’t surprise anyone at 2 a.m. ## Accepting Whatever Cipher Suite Defaults Came in the Box ### How It Happens You spin up an EC2 instance, install nginx or Apache, and the default cipher list “seems fine.” Six months later your SOC finds RC4 and 3DES still peeking through during a routine scan. ### Why It Hurts Weak ciphers enable practical brute-force attacks, lack forward secrecy, or leak plain-text bytes through side channels. Attackers love the wiggle room these defaults provide. … ## Treating Certificates Like Set-and-Forget Artifacts ### How It Happens A certificate is issued manually, placed on a server, and nobody thinks about it again until an expiration banner appears—usually the night before Black Friday. In the panic, someone grabs a self-signed certificate as a stopgap and the chain of trust breaks for half your users. ### The Real-World Fallout Downtime, frantic war rooms, and—if you’re unlucky—devices that pinned the old public key suddenly refusing connections. ### Better Practices Automate renewal with ACME or your internal PKI. Implement certificate transparency monitoring so you get emails the moment an unexpected cert for your domain appears. Test the full chain (leaf, intermediate, root) in staging before pushing to production. ## Forgetting About Certificate Revocation ### How It Happens Your private key leaks into a public GitHub repo, you revoke the certificate in your CA portal, and you’re done—right? Unfortunately, most browsers no longer check Certificate Revocation Lists (CRLs) by default, and OCSP responders have a habit of failing open. … ## Ignoring Performance Side Effects That Turn Into Security Issues ### How It Happens You pile on every security flag—TLS 1.3, 4096-bit RSA, AES-256—but CPU usage spikes. Ops reverts to a weaker configuration for “temporary” relief, which sticks for months. ### A Smarter Approach Prefer elliptic-curve certificates (P-256) over large RSA keys; they’re faster and more secure. Enable session resumption (tickets or IDs) to avoid full handshakes on repeat connections. Benchmark before and after changes; data beats gut feelings in performance debates. ## Overlooking HTTP Security Headers That Complete the Story You can have flawless TLS and still leak user sessions if the browser silently falls back to plaintext or loads active content from an insecure domain. Must-Have Headers: HSTS (HTTP Strict Transport Security) with a long max-age stops protocol downgrades. HTTPS-only Content-Security-Policy blocks accidental mixed content. Expect-CT and, soon, Expect-Staple give you visibility into certificate usage. ## Leaving Testing to the Scanners ### How It Happens The team schedules a quarterly scan, fixes whatever fails, and checks the box. That window is large enough for attackers to exploit a newly disclosed weakness. ### Better Game Plan Add TLS configuration tests to your CI/CD pipeline. Spin up canary environments that mirror production and run them through automated tools like testssl.sh or sslyze with every commit. Incorporate manual peer review—humans often spot misconfigurations automation misses. ## Assuming “One Size Fits All” Across Services A cipher policy perfect for public web servers may break legacy SMTP, database connections, or embedded OT devices. The reverse is also true: loosening everything to accommodate one stubborn service drags the whole fleet down. Practical Solutions: Maintain tiered policies (strict, moderate, legacy) and map services to them explicitly. Isolate genuinely legacy systems in segmented networks with compensating controls such as VPNs or application-layer gateways. Document exceptions so future engineers understand the trade-offs you made.

6/3/2025Updated 6/4/2025

Occasionally, a red flag appears that causes concern. One of the most common and misunderstood results is a failed TLS test or SSL certificate errors, especially when the ssl certificate installed is not properly configured. … More often, it indicates that your system is supporting outdated protocols, weak cipher suites, or has misconfigurations in the SSL certificate chain. Understanding exactly what the scan is reporting allows you to address the issues effectively and maintain a secure connection for your users. ... ### Outdated TLS Versions Older TLS versions, such as TLS 1.0 and TLS 1.1, are no longer considered secure. Security scanners and modern browsers flag them even if clients rarely use them. Supporting these outdated protocols can result in SSL protocol error messages or generic ssl protocol error notifications. TLS 1.2 is now the minimum standard for secure communication. TLS 1.3 provides additional security and improved performance. If a scan reports support for TLS 1.0 or TLS 1.1, it usually means that the server has not explicitly disabled these protocols. Many modern browsers will refuse to connect with them. Their presence can still affect SSL certificate not trusted errors. ### Weak Cipher Suites Cipher suites are the algorithms that TLS and SSL use to encrypt communications. Older ciphers such as RC4 or MD5 are considered weak and vulnerable. If your server still lists them as supported, scanners will flag this as a vulnerability. Common messages include: - SSL routines: ssl_choose_client_version: unsupported protocol - SSL handshake failure - SSL connection error … ### Common SSL Certificate Errors Certificate-related problems are one of the most frequent causes of SSL certificate errors, including expired SSL certificates that trigger error messages, self-signed certificates that result in not trusted errors, domain mismatch errors when the certificate does not match the requested website, revoked certificates that have been compromised, missing intermediate certificates in the chain, and issues with the overall certificate chain. … 1. **Check Protocol Support** - Run a Cyber Chief scan to confirm which TLS versions are enabled - Disable TLS 1.0 and TLS 1.1 if present - Ensure modern TLS protocol support 2. **Verify Cipher Suites** - Ensure weak ciphers such as RC4 and MD5 are disabled - Allow only strong ciphers following current best practices - Test cipher suite compatibility

9/23/2025Updated 3/25/2026

However, production-ready code is about much more than just styling. For a product to be production-ready, developers need code that is well-architected, efficient, scalable, and performance-optimized. While Dev Mode can help with the visual translation, it doesn’t handle critical areas like: **State management**: Figma exports static layouts and styles but doesn't automatically handle interactive elements or user states (like form inputs or dynamic UI changes). **Component logic**: The tool can generate simple UI elements, but it doesn't manage complex logic or behaviors (e.g., managing API calls, error handling, or complex routing). **Responsiveness**: While Figma can help create layouts that are visually accurate, it won’t write the responsive code that adapts a design across multiple screen sizes, something that developers must handle manually. Ultimately, Dev Mode does not aim to fully replace developers; it serves as an Despite the many advances Figma has made in One of the primary drawbacks of using Figma’s Dev Mode is the lack of control over code organization. When Figma exports code, it focuses primarily on visual styling rather than ensuring that the code is structured for long-term maintainability. For example, while Figma’s code snippets might be visually accurate, they may lack important **Code modularity**: Without the use of modular components, developers might find themselves working with monolithic, non-reusable code. In real-world applications, this can be inefficient and time-consuming. **Naming conventions**: Dev Mode exports code based on how elements are named in Figma. If designers use inconsistent naming conventions or fail to structure the design system properly, the exported code can be messy and difficult to manage. This can add hours or even days of additional work for developers who have to refactor poorly organized code. **Scalability**: As designs become more complex and teams scale their applications, the lack of well-structured, While Figma can generate code for static design elements, interactive features are a different story. If a design requires interactive components, like dropdown menus, form validation, or dynamic content updates, Figma does not generate the logic required to make these components functional. … For a startup that needs a landing page or static marketing website, Figma’s Dev Mode might be sufficient. The designs are typically simple, and AI-generated code for a static page can work quite well. However, as soon as a dynamic feature or more complex interaction is introduced, the quality of the exported code drops. In these cases, while Figma can help with styling and asset exports, developers still need to handle the back-end integration or dynamic state management, which AI and Dev Mode cannot do. … **Collaboration**: Developers should collaborate closely with designers to ensure the exported code matches the design’s intended behavior. This is particularly important for interactive elements and responsive layouts. **Code Review**: While Figma can generate code, it still requires manual review and refinement. Developers should be prepared to clean up the exported snippets, add necessary functionality, and test for performance. By adhering to these practices, teams can use Figma’s Dev Mode as a powerful tool to accelerate their workflow, but the responsibility of ensuring production-quality code still lies with the developers. While AI-powered design-to-code tools like Figma Make are designed to automate some of the more tedious aspects of the handoff process, it's important to understand where they truly excel and where they still fall short. AI’s ability to quickly generate static code for simple layouts and style rules is undeniably helpful, but these tools still need significant improvements to handle the more complex aspects of development. … However, while these tools can dramatically speed up the design-to-code process, they still fall short of delivering production-ready code on their own. The code generated by Figma’s Dev Mode or AI-powered tools serves as a foundation—not the final product. Developers still need to refine the code, optimize performance, implement interactivity, and ensure responsiveness. In other words, Figma has made the process faster and more accurate, but the role of the developer remains as crucial as ever in ensuring that the final product meets industry standards.

6/24/2025Updated 1/22/2026

There`s no logic in the new interface. No fundamental reason to facelift the UI. In an attempt to “clean up the mess”, Figma has made simple tasks much harder to complete. What used to be done in a couple of clicks now takes a series of them as the functions that are most important are hidden now. The power users who have long been expressing their loyalty to Figma seem to be forgotten and the content – for example, the new UI – to be aimed at the people who aren't really professional designers. The general concept is obvious – expanding TA at the expense of losing the long-standing expert audience that works with rather complex design systems. I'd hate to be exaggerating, but other users are of the same opinion – there are lots of complaints about such widely-used features as the floating white panels and the toolbar blending with frames and thus complicating the process of work. Lots of designers apply it in their work on a daily basis, but Figma seems to know nothing about it. Moreover, trying to redesign made no improvements and rather worsened the overall experience. … ## Four Biggest Pain Points It's worth mentioning that the UI points and the AI features are just the beginning of a long story. The other functions that I consider to be of great importance are as follows: 1. **Floating panels:** They take up a lot of space and complicate the usage of both the rulers and the guides. If you don't minimize the panel, it keeps irritating you all the time. 2. **Floating toolbar:** It blends in with the frames and is inconvenient to use. It has been a common opinion that it's better to be moved to the top or bottom, and this opinion was widely expressed but Figma has ignored it so far. 3. **Non-contextual toolbar:** All the useful functions were moved to the right panel and merged behind the More Actions menu. This move made everyone suspect Figma is inclined to hide all the frequently used functions as far as possible. 4. **Nested instances are collapsed by default:** That's the one that struck me most. I have to manually open each accordion for each instance I need to customize – a total waste of time and a disturbance.

7/30/2024Updated 3/19/2026

- • **The highlights:** Grid feature is a genuine game changer, Dev Mode MCP is the sleeper hit, AI tools are useful but overhyped - • **The problems:** 20-29% price increases on Organization plans, forced bundling, real performance issues during screen sharing … ### The Year at a Glance The Good News ... - - IPO validates long-term viability The Challenges - - Price increases of 20-29% for Organization plans - - Performance drops during screen sharing are real - - Community backlash over forced bundling of FigJam and Slides - - Penpot saw 300% growth — real competition is here - - UI3 interface changes made some workflows slower … ### Figma Make: AI That's Actually Useful (Sometimes) ... ## The Performance Problems You Need to Know About I've been hesitant to write this section because Figma's performance has generally been a strength. But 2025 introduced real issues that Figma hasn't adequately addressed, and pretending otherwise wouldn't be honest. Multiple community reports confirm what I've experienced firsthand: significant performance degradation in specific scenarios. These aren't just minor annoyances — they affect how you work and, more importantly, how you present your work to stakeholders and clients. ### Screen Sharing Drops This is the big one. Frame rates drop to 15-20 fps when using Figma during Microsoft Teams or Zoom calls. I've been in client presentations where Figma became essentially unusable during screen sharing, forcing us to switch to static screenshots mid-meeting. That's not just embarrassing — it undermines confidence in your design process. … ### Complex File Performance Even high-end MacBook Pros struggle with deeply nested components and large design system files. Files that worked fine in 2024 started hitching after the UI3 updates. The issue seems to compound: the more components you reference, the worse it gets, which is ironic given that components are supposed to keep things organized. … ### UI3 Growing Pains The new UI3 interface was supposed to modernize Figma's look and feel. In practice, it made some existing workflows slower. Commonly-used panels moved or changed behavior, and muscle memory from years of Figma use became a liability rather than an asset. Version 125.4.8 was particularly problematic, with widespread reports of lag and unresponsiveness. **Silver lining:** Most of the UI3 friction fades after a couple of weeks of use. But the transition period is genuinely frustrating, especially if you're in the middle of a deadline-driven project. Practical Fixes If You're Staying with Figma **For screen sharing:** Use Figma's built-in presentation mode instead of sharing your entire screen. Prepare static screenshots as backup for critical meetings. Consider recording design walkthroughs with Loom instead of live demos. … ## Pricing Reality: What You Actually Pay Figma's March 2025 pricing changes caught many teams off guard, and the community backlash was swift. But let's be honest: this was inevitable. Figma knew they had market dominance and an upcoming IPO to price for. The timing wasn't accidental. The most frustrating part isn't even the price increases themselves — it's the forced bundling. Teams that never used FigJam or Figma Slides are now paying for them whether they want them or not. It feels like cable TV all over again, and many designers are rightfully annoyed. ### The New Pricing Structure 6-10% Professional Plan increase Manageable for most solo designers 20-29% Organization Plan increase The one that caused the outrage $45K+ Extra annually for 250 seats Enterprise teams hit hardest **The bundling problem:** You now pay for Figma Slides and FigJam even if you never use them. Many teams feel like they're subsidizing products they didn't ask for. Figma's argument is that bundling provides "more value." The counter-argument is that forcing people to buy things they don't want isn't value — it's a price increase with extra steps.

1/15/2025Updated 4/9/2026

… ### ✅ Upsides - Quicker iteration on real behavior - Reduces dev dependency for prototyping - Encourages tighter alignment with product and engineering early ### ⚠️ Downsides - Risk of over-relying on AI code without QA - May create false expectations around “designer-as-developer” - Limited to standard UI patterns (custom setups still need engineers) … ### ✅ Upsides - Accelerates campaign and MVP launch timelines - Integrates tightly with design systems and live previews - Cuts down engineering backlog for non-product pages ### ⚠️ Downsides - Could lead to fragmented site management without strong governance - Not suited (yet) for complex integrations, APIs, or scalable web architectures - CMS still pending (coming later this year) … ### ✅ Upsides - Easier to build scalable dashboards, complex layouts - Reduces guesswork for responsive design - Produces clean Grid CSS in Dev Mode ### ⚠️ Downsides - Learning curve for designers unfamiliar with grid-based systems - Could introduce over-engineered layouts if misused - Needs careful QA to ensure dev parity … ### ✅ Upsides - Eliminates context-switching across tools - Empowers teams to create expressive, custom visuals in-canvas - Useful for both brand elevation and in-product storytelling ### ⚠️ Downsides - Easy to overcomplicate UIs with overly stylised graphics - Still lacks parity with mature illustration tools for complex work - Can distract from UX fundamentals if not managed well … ### ✅ Upsides - Reduces low-value design task load - Makes marketing and CX teams more autonomous - Maintains brand governance through template control ### ⚠️ Downsides - Risk of design systems being misused if templates aren’t well-defined - Teams may bypass designers completely without proper training - Requires initial effort to build strong foundational templates ## Final Thoughts: Use With Intention, Not Just Excitement The latest Figma updates are powerful, no doubt. But they’re not magic bullets, and **as design leaders, it’s our job to:** - Train teams not just on features, but on their strategic context. - Define clear governance models for who uses what—and how. - Reframe our workflows to reflect this new “full-stack” design era. In conclusion, Design is getting more integrated than ever.

5/13/2025Updated 9/4/2025

www.brandon.ngo

Figma - Brandon Ngo

For the most part, it was difficult finding negative reviews because of the company's dedication to creating a product that accounts for so many different pain points. Virtually everyone feels positively towards the design tool, and the majority of negative reviews were critical on development (e.g. too performance heavy, no offline use, load time). People just love Figma. … As a result, the Drafts page and Figma as a whole eventually turn into an aggregated collection of files that have no relation to each other at all. In designing a collaborative environment for teams and also to stay on track with business goals, Figma had overlooked personal users when they developed the file browser. In order to consolidate files, all individuals must utilize Teams, … From these insights, I was able to assess the scope of the main issue at hand: Figma's organization system was designed for teams and fails to account for standalone users, lacking essential file management features. From the UX audit and user feedback, it's evident that there's a pressing issue with the lack of segmentation features. By consolidating the structure of Recently Viewed and Drafts into one along with a dynamic search bar that is globally and locally adapted to all pages, the overall discoverability of files is improved and file management becomes much more swift, simple, and segmented.

10/19/2020Updated 12/16/2025

I genuinely don’t understand how Figma continues to dominate given how hostile the experience has become — for both users and developers. The UX is chaotic and non-intuitive: layers buried under layers, controls hidden behind inconsistent interaction models, and navigation that feels designed to fight the user instead of helping them. For many people — especially neurodivergent users — the interface can feel actively exclusionary rather than empowering. It’s hard to shake the feeling that usability is no longer the priority. From a developer perspective, the situation is even worse. The platform is effectively closed. The MCP integration with Claude is read-only, and meaningful mutation requires plugins running inside Figma’s sandbox. There is no serious external API for programmatic design updates. That makes modern workflows — automation, CI-style pipelines, integration with engineering systems — far more difficult than they should be. Meanwhile nearly every capability surface seems designed to maximize monetization rather than ecosystem health. The result is a platform that behaves less like infrastructure for design systems and more like a gated environment teams are forced to work around. History is full of companies that confused market position with permission to squeeze their users and developers. It usually ends the same way: the ecosystem eventually moves on.

3/14/2026Updated 3/26/2026

**The reality check:** The demos were truly impressive—data viz, responsive layouts, animations—but we've learned through 100+ app projects that there's always a gap between demo magic and production reality. For simple prototypes? Game-changer. For actual production apps with security, performance, and maintainability requirements? Let's not throw away our keyboards just yet. … **The experienced perspective:** We've built hundreds of websites and web apps—some simple, some incredibly complex. Figma Sites will absolutely streamline simple marketing pages and portfolios. But real-world web apps need infrastructure, security, API integrations, user management, and performance optimization. For marketing sites? Figma just eliminated a whole category of projects. For real web apps? You still need experienced developers who understand systems, not just surfaces. … **Dev Mode Upgrades: The Actually Useful Part That No One's Talking About** ... As a team that's managed hundreds of design-to-development handoffs, these updates solve real problems: **Ready for Dev View** finally gives developers a unified list of what's actually ready to build, with clear indications of who changed what and when. After years of "is this the final version?" Slack messages, this is the real MVP. **Focus View** creates a distraction-free zone for developers that filters out design exploration noise. No more "ignore artboards 1-47" instructions. **Grid Support** that actually aligns with CSS Grid is *chef's kiss*. The responsive design features generate appropriate CSS, potentially saving hours of tedious translation work. **Code Connect** graduated from beta to general availability (for the premium tiers, naturally), with support for React, React Native, iOS, and Android. The component code snippets and improved property mapping could genuinely save development time. These improvements won't make headlines like the AI features, but they solve everyday friction points that we've experienced firsthand. Sometimes the mundane updates are the most impactful for daily workflows. **The AI All-You-Can-Eat Buffet: More Toys Than You Can Actually Use** ... Figma's own research shows a telling contradiction: 52% of AI tool builders think design is MORE important for AI products, yet only 32% of professionals fully trust AI output. That 68% skepticism? That's where quality engineering lives. ... As perennial app builders, here's our data-driven take on what Figma's expansion really means: **For marketing sites and simple web apps:** Figma Sites will genuinely accelerate production. We could see 30-40% faster delivery for straightforward projects. **For AI-assisted prototyping:** Figma Make will dramatically speed up the exploration phase, but there's still a Grand Canyon between impressive prototypes and production-ready code that works at scale. … The tools themselves aren't revolutionary—similar capabilities exist elsewhere—but putting them directly in the design workflow is the real innovation. It's not about whether AI can generate code; it's about whether it can generate the RIGHT code in the right context. What we've learned building apps for over a decade: Tools change constantly, but fundamentals don't. Great apps still require deep understanding of users, thoughtful system design, and collaborative problem-solving. Figma's new tools will accelerate parts of the process, but the real magic still happens in the space between designers, developers, and users.

5/10/2025Updated 6/3/2025

With that kind of growth comes a lot of problems. The product accrues debt in different areas (both technical and UX) as a team tries to scale fast. Business and user pressures lead to certain areas of the product being prioritized and others falling below the line of what you have the capacity to focus on. A lot of aspects of a product also become a lot harder to fix at scale.

9/13/2022Updated 4/1/2025