What wrong with this system to proactively check if customers’ passwords have been found in a breach?

Let’s say that during account creation, I already prohibit passwords known to be reused from breaches of other sites, like if it’s in the Have I Been Pwned list. But breaches happen all the time, so what if my customers’ passwords show up … Continue reading What wrong with this system to proactively check if customers’ passwords have been found in a breach?

Additional Encryption of SSL certificate and Public key before handshake?

I am currently working on a security-based product (VPN) and we have one critical requirement that I am unable to figure out.

The connection between the User and the VPN server is based on the OTP (One-time Pad) algorithm a… Continue reading Additional Encryption of SSL certificate and Public key before handshake?

Voja Antonic: Designing the Cube

Voja Antonic designed this fantastic retrocomputing badge for Hackaday Belgrade in 2018, and it was so much fun that we wanted to bring it stateside to the Supercon essentially unaltered. And that meant that Voja had some free time to devote to a new hardware giveaway: the Cube. So while his talk at Supercon in November was ostensibly about the badge, he just couldn’t help but tell us about his newer love, and some of the extremely clever features hidden within.

It’s funny how the hardware we design can sometimes reflect so much on the creator. Voja designed then-Yugoslavia’s first …read more

Continue reading Voja Antonic: Designing the Cube

Encryption For The Most Meager Of Devices

It seems that new stories of insecure-by-design IoT devices surface weekly, as the uneasy boundary is explored between the appliance and the Internet-connected computer. Manufacturers like shifting physical items rather than software patches, and firmware developers may not always be from the frontline of Internet security.

An interesting aside on the security of IoT traffic comes from [boz], who has taken a look at encryption of very low data rate streams from underpowered devices. Imagine perhaps that you have an Internet-connected sensor which supplies only a few readings a day that you would like to keep private. Given that your …read more

Continue reading Encryption For The Most Meager Of Devices