Latest posts

Cryptography

Quantum Crypto will Break our backs & bones

Most of us have heard about Quantum Computing and its immense power to break today's strongest security mechanisms. What is the sense and nonsense?

>> Continue reading <<

lecture,identity,architecture

[Lecture] IdentityHub: PKI for the Masses

Today, we present our vision on the SURF Security and Privacy Conference "Crisis? Business as Usual!" We describe the contents of our lecture in this article.

>> Continue reading <<

display

On Display #3: Perpetuum driver

Most of the IdentityHub involves workflow-styled processes... create a key, publish it in LDAP, set it up in a DANE, wait a while, set it up in a server, wait a while, remove a predecessor from DANE, and many more such actions. To coordinate such process is difficult, let alone allow dynamic enhancements in individual identity hosting contexts. Perpetuum presents an answer.

>> Continue reading <<

hardware

Standardising the Hacker's RS-232 Jack Plug

We all need to hack around with hardware from time to time. A highly useful way to gain access is the RS-232 serial connector to a terminal interface, where console output is dumped, and command access is often available. This is available on virtually all digital circuit boards as an optional pin header and virtually always at a 3V3 level. Why not agree on a simple way to unleash these with a carefully specified jack plug, and be compatible?

>> Continue reading <<

display

On Display #2: LillyDAP library

Say "little" with a thick tongue, and it sounds like "lill'". That is how we constructed the name LillyDAP, as a nickname for our Little LDAP library. A completely new approach to the protocol, approaching it as a semantically rich data access protocol, rather than a database language.

>> Continue reading <<