Latest posts

architecture

Identity 16: Support Levels for Realm Crossover

The essential game of Realm Crossover is one of juggling realms as part of identities. This brings us a number of "support levels" that we could describe. This forms an interesting perspective on the growing path of the InternetWide Architecture.

>> Continue reading <<

Cryptography

Quantum Proofing your VPN

The predictable future arrival of Quantum Computers is problematic at the present time, and especially encryption protocols need attention. How can you use your VPN in a Quantum Proof manner?

>> Continue reading <<

networking

Networking #2: Reliable Peering over 6bed4

For client-server networking, NAT traversal is a solved problem. For peer-to-peer networks it is not possible to do in general, but the potential of these networks in the liberation of users from "central" services is quite big. The 6bed4 tunnel allows applications to be designed as peer-to-peer IPv6 applications with only a fallback (to your own tunnel server) if necessary.

>> Continue reading <<

networking

Networking #1: Backward Compatible with IPv4

IPv6 brings benefits in terms of network address policy, peer-to-peer support and privacy. By reducing IPv4 to backward compatibility we set the tone for a long-overdue transition. The approach given below makes it very attractive too; full IPv6 benefits for those who make the effort to at least install a tunnel, with fully reliable client-server usage patterns for those who stick to IPv4.

>> Continue reading <<

identity

Identity 15: Entering Security Codes

Strong security starts with big numbers, in the range of 38 digits (128 bits) for the current level, with an imminent upgrade to 77 digits (256 bits) to thwart Quantum Computers. We can make such security codes a little less dreadful to use.

>> Continue reading <<