Posts – Page 2

display

On Display #3: Perpetuum driver

Most of the IdentityHub involves workflow-styled processes... create a key, publish it in LDAP, set it up in a DANE, wait a while, set it up in a server, wait a while, remove a predecessor from DANE, and many more such actions. To coordinate such process is difficult, let alone allow dynamic enhancements in individual identity hosting contexts. Perpetuum presents an answer.

>> Continue reading <<

hardware

Standardising the Hacker's RS-232 Jack Plug

We all need to hack around with hardware from time to time. A highly useful way to gain access is the RS-232 serial connector to a terminal interface, where console output is dumped, and command access is often available. This is available on virtually all digital circuit boards as an optional pin header and virtually always at a 3V3 level. Why not agree on a simple way to unleash these with a carefully specified jack plug, and be compatible?

>> Continue reading <<

display

On Display #2: LillyDAP library

Say "little" with a thick tongue, and it sounds like "lill'". That is how we constructed the name LillyDAP, as a nickname for our Little LDAP library. A completely new approach to the protocol, approaching it as a semantically rich data access protocol, rather than a database language.

>> Continue reading <<

display

On Display #1: Quick DER library

Our work on security makes us deal with a lot of ASN.1 data, mostly encoded as DER. We designed the Quick DER library to have a commercial-grade tool to manipulate it... except that it is released in open source.

>> Continue reading <<

Hosting

Spam Filtering: Balancing the Odds

Mail was designed as a gullable system, and this is generally abused by spammers. Fighting spam is a balancing act between failures to accept and reject. With the more refined identity model of the IdentityHub, we have new tools to strike a better balance.

>> Continue reading <<