Category Archives: Uncategorized

Blinding the spy in our pockets

Ars Technica and NPR collaborated on an interesting story. The Ars reporter, Sean Gallaghan, installed a “modified” Wi-Fi router in the office of the NPR journalist, Steve Henn. The “PwnPlug” router can capture and analyze the traffic, mimicking what the … Continue reading

Posted in Uncategorized | Leave a comment

DMARC or not, can email evolve?

Many years ago, I worked on email standards, developing for example a gateway between SMTP/TCP-IP and X.400. We used it in the very early years of the Internet, from 1983 to about 1990, when European research networks finally gave up … Continue reading

Posted in Uncategorized | 2 Comments

The Apple TLS bug, and coding guidelines

Right when the whole industry appears to respond to the NSA spying by reinforcing their encryption defense, we learn about a bug in Apple’s TLS implementation. There are many comments on the web about the genesis of this bug, such … Continue reading

Posted in Uncategorized | Leave a comment

On IPv6 security, SEND, CGA, and alternatives

Some time ago, in 2005, Tuomas Aura of Microsoft Research proposed a way to embed a “cryptographic proof” in the IPv6 addresses. The idea was to tie the address to a public key, by encoding in the IID part of … Continue reading

Posted in Uncategorized | 5 Comments

A Server in Every Home

Our representatives just voted down the amendment do defund the NSA domestic monitoring program. The good news is that 205 representatives had the courage to vote “Yes” but the leaders of both democrats and republicans supported the NSA. What that … Continue reading

Posted in Uncategorized | 3 Comments

Let’s build a cookie exchange

Bruce Schneier’s post on Internet privacy hits the nail on the head. He is not the first one to make the point. Scott McNealy did that in 1999. Reporters were asking questions about the privacy implications of Sun’s Java/Jini technology, … Continue reading

Posted in Uncategorized | Leave a comment

Looking back at Teredo, IPv6 deployment, and protocol design

I just read the paper on Teredo published in the Computer Communication Review: Investigating the IPv6 Teredo Tunnelling Capability and Performance of Internet Clients by Sebastian Zander, Lachlan L. H. Andrew, Grenville Armitage, Geoff Huston and George Michaelson. This is … Continue reading

Posted in Uncategorized | Leave a comment