Quick Robin! The Bat Keychain!

We don’t know if Batman has a keychain for the keys to the Bat mobile, the Bat copter, and all his other vehicles. But we are guessing if he did, it didn’t look like the one [krishnan793] picked up cheap. It had a little button that lit up some LEDs and played a little tune. [Krishnan] thought he could do better with an ESP8266. After chopping up some headphones and adding a LiPo battery, he wound up with an improved key chain you can see in the video below. The first video is the before video. The second is after …read more

Continue reading Quick Robin! The Bat Keychain!

Should a server or a client be able to verify a client/server certificate – intermediate certificate chain with a known root ca?

I am trying to test the following setup:

A RADIUS server works with the EAP-TLS protocol. The client and the server have the following certificates:

Client
Public Key: clientcert_intermediatecert_chain.pem
CA-certificate: r… Continue reading Should a server or a client be able to verify a client/server certificate – intermediate certificate chain with a known root ca?

Multipurpose ESP8266 keychain

One of the best feature of the ESP8266 is it’s ability to self-host a web server, allowing for fairly complicated user interactions. The dEEbugger by [S-March] is a nifty little ESP8266 based device with a plethora of features in a small package.

The USB-powered device has a web user interface that enables it to be used as a low bandwidth oscilloscope, I2C terminal, or UART terminal. As an scope, you may connect to it via your tablet and then use it as a remote voltage monitor. There is a peak detection feature which is a nice touch and gives the …read more

Continue reading Multipurpose ESP8266 keychain

Is it safe to use an encryption library (e.g., RNCryptor) instead of Keychain to store a user account password for an iOS app?

I’ve been told that iOS Keychain has a bug where it sometimes returns null values. The dev who encountered this issue suggested rolling out our own password storage solution instead of using Keychain, so that we can bypass th… Continue reading Is it safe to use an encryption library (e.g., RNCryptor) instead of Keychain to store a user account password for an iOS app?

Researchers Find ‘Severe’ Password Security Hole with iOS 10 Backups

Security firm claims to have found a new weakness in Apple’s iOS 10 that makes it possible to crack password-protected local backups of data for iOS 10 devices. Continue reading Researchers Find ‘Severe’ Password Security Hole with iOS 10 Backups