Baby Monitor Rebuild is also ESP8266 Audio Streaming How-To

[Sven337]’s rebuild of a cheap and terrible baby monitor isn’t super visual, but it has so much more going on than it first seems. It’s also a how-to for streaming audio via UDP over WiFi with a pair of ESP8266 units, and includes a frank sharing of things that went wrong in the process and how they were addressed. [Sven337] even experimented with a couple of different methods for real-time compression of the transmitted audio data, for no other reason than the sake of doing things as well as they can reasonably be done without adding parts or spending extra …read more

Continue reading Baby Monitor Rebuild is also ESP8266 Audio Streaming How-To

How to defeat CRIME, BREACH, TIME etc… server side (without sacrificing compression)

I am writing full-stack server side software and I have been researching CRIME attacks and it’s relation to SPDY header compression as I am implementing the server side codecs for it at the moment.

The conclusion seems to be… Continue reading How to defeat CRIME, BREACH, TIME etc… server side (without sacrificing compression)

Is NTFS file compression vulnerable to a CRIME-like attack when using an encrypted volume?

I know that content compression can cause SSL to be vulnerable to the CRIME attack, via changes in the content length when injected plaintext matches existing content. Does this principle carry over to NTFS file compression on volumes that… Continue reading Is NTFS file compression vulnerable to a CRIME-like attack when using an encrypted volume?