VPN for Companies – “Bring Your Own Device” Made Easy

We pushed hard to extend our Private Spaces and make them a great choice for companies to connect roaming users (and their own devices, while providing a high-level of security for BYOD policies).

Continue reading VPN for Companies – “Bring Your Own Device” Made Easy

Unbreakable Encryption with Secure Hardware and Geopolitics

From supercomputers to IoT – processors (or chips) are everywhere. Computer chips protecting our privacy and security would first travel the world to get designed, fabricated, and personalized. Even if we had an unbreakable encryption algorithm, it may be defeated by its manufacturing. Let’s exploit superpowers and their influence to create a practical unbreakable encryption.

Continue reading Unbreakable Encryption with Secure Hardware and Geopolitics

Think OpenVPN is easy? Think again as it’s worth it

We decided for OpenVPN to build secure connections to our Private Spaces. We braced for difficulties, but that was only the beginning. The point of this post is that integration testing does make a difference. And that OpenVPN is a very nice tool!

Continue reading Think OpenVPN is easy? Think again as it’s worth it

Private Space Gateway launched

The Gateway is our first Private Space – like a VPN (if you know it), but for sharing and co-operation. We have been building Private Spaces for the last three months – a one-click secure cloud space for companies, teams, or home users.

Continue reading Private Space Gateway launched

Private Cloud Space and Gateway in A Few Minutes – OpenVPN on AWS

Brainstorming session: what is key management really useful for? VPN.!?! Whatever is VPN for? Well, it could create a “private space”. A space where we could share documents, put private messaging server, or just make it a gateway to an existing office network or even the internet.

Continue reading Private Cloud Space and Gateway in A Few Minutes – OpenVPN on AWS

EV Certificates – Value for Money? Incl. Troy Hunt Q&A

I have come across Troy Hunt’s article yesterday about getting an EV certificate. His initial assumption is that EV certificate actually proves something, unlike many other seals of “security”. But is it really worth spending $80+/year?

Continue reading EV Certificates – Value for Money? Incl. Troy Hunt Q&A

Transaction Security with Slow Clock and Counter – How to Conjure Up Entropy

I love cryptography. It’s an abstract science, where I can define a problem, come up with a solution and prove it (eventually). I also like applying cryptography as it involves real world (users, limitations of computers, …), which messes everything up and turns pure mathematics into a fun game. Continue reading Transaction Security with Slow Clock and Counter – How to Conjure Up Entropy

Self-driving Cyber Security – Step 1: Professional PKI

Many companies drive their computer systems without wearing seatbelts, even though they know and constantly witness they risk being injured by cyber crashes. There are simple economic reasons for this. It is not the unavailability of cyber “seat belts”, but the difficulty of putting them in. Enigma Bridge technology gives customers self-driving cyber-security for safe navigation through the cyberspace and protection of its payload.

Continue reading Self-driving Cyber Security – Step 1: Professional PKI

Do Not Trust Experts – from Brexit to Internet

I was a researcher, I believed that we were independent, un-biased, the true source of knowledge (and I still do). What I didn’t appreciate at the time was that researchers were terrible in defining borders of their expertise and saying “I don’t know”.

Continue reading Do Not Trust Experts – from Brexit to Internet

How Certbot and Letsencrypt Work (DNS and SNI-TLS automation)

We introduce an integration plugin for Let’s Encrypt. It provides integration for a variety of mechanisms that enable and simplify verification of domain control and certificate installation. We already tested it with Dehydrated (former letsencrypt.py) . It supports all existing verification methods: DNS, HTTP and TLS-SNI, in their current versions “01”.

Continue reading How Certbot and Letsencrypt Work (DNS and SNI-TLS automation)