Blog roll please!

Quick reads across a variety of topics

Blockquick Super Light Blockchain Client For Trustless Time

Burning Platform

24 May
19:12
Blockquick Super Light Blockchain Client For Trustless Time
- Click here if you just want to read the Paper - In the last two posts of this series, we first introduced the governance issues in PKI and then the circular dependency between establishing trust in PKI certificates and establishing the current time on a connected device. So let’s break that circular dependency between time and trust. The difference between trusting a person/an entity and trusting data is key here. How can we establish...

From Software Defined Networking to Blockchain Defined Networking

Decentralization

22 May
17:02
From Software Defined Networking to Blockchain Defined Networking
Software Defined Networking (SDN) and Network virtualization have been the disruptor technologies that were fundamental to the success of Infrastructure as a Service (IaaS) providers such as Amazon AWS, Google Cloud Compute, and Azure during the last decade. Before that, there were plenty of rival cloud providers - for most of them, changing network configurations, adding/removing machines to a network required human interaction and would take hours or sometimes days. Dedicated networking, networking lines, and...

The impact of decentralized infrastructure on wireless communications

Decentralization

20 May
09:19
The impact of decentralized infrastructure on wireless communications
The Diode Network enables practical distributed trust for IoT communications (and for other modalities as well). The implications of this for distributed IT infrastructure are significant. However, as the reality of distributed infrastructure emerges, other more immediate applications on the way to fully distributed infrastructure are also interesting. One of these applications is distributed wireless network operations. For star topology wireless networks, as exists in today’s cellular communications paradigm, there are four primary things required...

Introducing Proof-Of-StakeWork

Blockchain

06 May
13:42
Introducing Proof-Of-StakeWork
[Note: This post requires background knowledge in blockchain technology. We have provided links to background information.] After determining a blockchain project’s reason for existence, the next most important decision developers and entrepreneurs must consider is the mechanism through which their network will arrive at consensus. There are many different types of consensus protocols, but the vast majority of them can be placed into one of two buckets, Proof-of-Work (POW) or Proof-of-Stake (POS). Many developers may...

Why We Can't Trust Network Time

Burning Platform

26 Apr
11:41
Why We Can't Trust Network Time
“If you knew Time as well as I do,” said the Hatter, “you wouldn’t talk about wasting it. It’s him.” “I don’t know what you mean,” said Alice. “Of course you don’t!” the Hatter said, tossing his head contemptuously. “I dare say you never even spoke to Time !“ Alice in Wonderland In order to trust a time source, we need to validate its certificate. In order to validate a certificate, we need to know...

Why there are 3652 organizations that can read everyone's encrypted traffic

Burning Platform

08 Apr
13:23
Why there are 3652 organizations that can read everyone's encrypted traffic
You may not be aware of this but if you are browsing the web or running IoT devices in your business or at your home, you are being protected by a 30-year-old security infrastructure. In this post, we will uncover the history of the internet PKI that holds most of the internet together today and highlight some of the most obvious threats and known flaws. This article is the first in a series investigating the...

Decentralized PKI in a nutshell

Burning Platform

20 Mar
16:58
Decentralized PKI in a nutshell
In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your certificate all have to agree on the same data to create this security. A single miss like a domain name server pointing to a different server...

How the End of Mining Could Lead to the ‘Uberization’ of Infrastructure

Decentralization

07 Mar
12:11
How the End of Mining Could Lead to the ‘Uberization’ of Infrastructure
The public was aghast back in early 2018 when PwC Bitcoin specialist Alex de Vries estimated that Bitcoin servers consume more than 22 terawatt-hours of electricity per year which is comparable to entire countries such as Austria and Ireland. To many, this was a brewing crisis that if left unchecked would render blockchains unscalable and unsustainable Even Bitcoin’s strongest supporters recognized that the energy consumption issue presented a barrier to growth and mainstream adoption. The...

DarkMatter and industrial IoT security

Burning Platform

27 Jan
12:11
DarkMatter and industrial IoT security
On Monday, Bleeping Computer published an article about the disturbing revelation that Dark Matter, a cybersecurity firm based in the United Arab Emirates, has aspirations to become a trusted root certificate authority in one of the world’s most popular web browsers. A certificate authority (CA) plays an important role in the public key infrastructure (PKI) which ensures secure communication over the internet. CAs are trusted entities that manage, issue and sign digital security certificates that...

Breaking new ground in IoT

Press

21 Jan
13:23
Breaking new ground in IoT
After months of incubation we’re excited to start talking about our new, we believe groundbreaking, initiative: DiodeSM Incubating within Exosite, we’ve been working hard to fix some of the fundamental shortcomings of PKI that are underlying 99% of all Internet communication today. For the first time now it becomes practical, with Diode, to use blockchain technology to eradicate the issues with PKI for IoT devices. Our technologies work even on low-end embedded devices and increase...
< 1 2 3 4 5 6 7 8 9 >