Posts tagged 'architecture' – Page 2

Cryptography

Quantum Proofing your VPN

The predictable future arrival of Quantum Computers is problematic at the present time, and especially encryption protocols need attention. How can you use your VPN in a Quantum Proof manner?

>> Continue reading <<

networking

Networking #2: Reliable Peering over 6bed4

For client-server networking, NAT traversal is a solved problem. For peer-to-peer networks it is not possible to do in general, but the potential of these networks in the liberation of users from "central" services is quite big. The 6bed4 tunnel allows applications to be designed as peer-to-peer IPv6 applications with only a fallback (to your own tunnel server) if necessary.

>> Continue reading <<

networking

Networking #1: Backward Compatible with IPv4

IPv6 brings benefits in terms of network address policy, peer-to-peer support and privacy. By reducing IPv4 to backward compatibility we set the tone for a long-overdue transition. The approach given below makes it very attractive too; full IPv6 benefits for those who make the effort to at least install a tunnel, with fully reliable client-server usage patterns for those who stick to IPv4.

>> Continue reading <<

identity

Identity 15: Entering Security Codes

Strong security starts with big numbers, in the range of 38 digits (128 bits) for the current level, with an imminent upgrade to 77 digits (256 bits) to thwart Quantum Computers. We can make such security codes a little less dreadful to use.

>> Continue reading <<

identity

Identity 14: Bootstrapping Online Identity

Users forget passwords all the time. This leads to an email sent to an address whose password you ought to have. If not, you may cascade back into your online history, ending in your dial-in modem account with an ISP that does not exist anymore. Something is wrong here...

>> Continue reading <<