Entries
-
I've made some experiments with compressing individual URLs, and I describe my initial observations (while comparing ...
-
My personal experience in finding affordable EU-based cloud providers for a small personal project. And my pessimisti...
-
About how another instance of "the scientific progress justifies the means", or perhaps "how a corporation milks prof...
-
Experimenting with Linux policy based routing, i.e. `man ip-rule(8)`, as a stateless firewall substitute.
-
Demystifying the UEFI boot process with a focus on Linux, simplicity, reliability, and security.
-
Updating the Infineon TPM firmware on an HP t620 thin client, which is vulnerable to the ROCA attack (that allows an ...
-
How about splitting the usage and storage of sensitive documents and data? Plus a few ideas on how to implement a sma...
-
Experimenting with password-based authentication implemented directly in Postgres, all sprinkled with a few twists.
-
A subtle, but surprising, realization about password-based key-derivation functions when using long byte sequences as...
-
Documenting various open-source tools and projects that I've found while experimenting with the Linux container techn...
-
`sh` is not a programming language! Write application launchers in proper languages!
-
Immutable OSs are just a minor step towards reliable OS installations. However, for a complete solution we also need ...
-
A rant about the complexity of modern Linux distributions, which places them on par with the opaqueness of Windows an...
-
A live document providing learning resources and pointers for those that want to experiment with applied cryptography.
-
Experimenting with various real-world instantiations of cryptographic random oracles, with applicability from multi-f...
-
Prototyping an encryption tool that allows combining multiple encryption factors, from PIN's, passwords, to X25519 pa...
-
I reflect on my preferences when it comes to choosing open-source tools I need to rely upon.
-
Experimenting with OpenSSH authorization keys resolution; from skeleton-key providing emergency access, to simple cen...
-
Trying to make the case for permanent irrevocable digital identities, which unfortunately today, by de-facto, are ema...
-
A few words about one of my latest open-source projects, `z-tokens`, that among other thinks, also tries to tackle th...