Tags


News [2]

DarkMatter and industrial IoT security

Article Blog Image

On Monday, Bleeping Computer published an article about the disturbing revelation that Dark Matter, a cybersecurity firm based in the United Arab Emirates, has aspirations to become a trusted root certificate authority in one of the world’s most popular web browsers. A certificate authority (CA)...

Breaking new ground in IoT

Article Blog Image

After months of incubation we’re excited to start talking about our new, we believe groundbreaking, initiative: DiodeSM Incubating within Exosite, we’ve been working hard to fix some of the fundamental shortcomings of PKI that are underlying 99% of all Internet communication today. For the first...

Blockchain [2]

Introducing Proof-Of-StakeWork

Article Blog Image

[Note: This post requires background knowledge in blockchain technology. We have provided links to background information.] After determining a blockchain project’s reason for existence, the next most important decision developers and entrepreneurs must consider is the mechanism through which th...

Breaking new ground in IoT

Article Blog Image

After months of incubation we’re excited to start talking about our new, we believe groundbreaking, initiative: DiodeSM Incubating within Exosite, we’ve been working hard to fix some of the fundamental shortcomings of PKI that are underlying 99% of all Internet communication today. For the first...

Burning Platform [4]

Why We Can't Trust Network Time

Article Blog Image

“If you knew Time as well as I do,” said the Hatter, “ you wouldn’t talk about wasting it. It’s him.” “ I don’t know what you mean,” said Alice. “ Of course you don’t !” the Hatter said, tossing his head contemptuously. “ I dare say you never even spoke to Time ! Alice in Wonderland In ...

Decentralized PKI in a nutshell

Article Blog Image

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your...

DarkMatter and industrial IoT security

Article Blog Image

On Monday, Bleeping Computer published an article about the disturbing revelation that Dark Matter, a cybersecurity firm based in the United Arab Emirates, has aspirations to become a trusted root certificate authority in one of the world’s most popular web browsers. A certificate authority (CA)...

PKI [4]

Decentralized PKI in a nutshell

Article Blog Image

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your...

DarkMatter and industrial IoT security

Article Blog Image

On Monday, Bleeping Computer published an article about the disturbing revelation that Dark Matter, a cybersecurity firm based in the United Arab Emirates, has aspirations to become a trusted root certificate authority in one of the world’s most popular web browsers. A certificate authority (CA)...

Industrial IoT [2]

DarkMatter and industrial IoT security

Article Blog Image

On Monday, Bleeping Computer published an article about the disturbing revelation that Dark Matter, a cybersecurity firm based in the United Arab Emirates, has aspirations to become a trusted root certificate authority in one of the world’s most popular web browsers. A certificate authority (CA)...

Distributed Infrastructure [1]

Development [1]

Decentralized PKI in a nutshell

Article Blog Image

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your...

Security [3]

Why We Can't Trust Network Time

Article Blog Image

“If you knew Time as well as I do,” said the Hatter, “ you wouldn’t talk about wasting it. It’s him.” “ I don’t know what you mean,” said Alice. “ Of course you don’t !” the Hatter said, tossing his head contemptuously. “ I dare say you never even spoke to Time ! Alice in Wonderland In ...

Decentralized PKI in a nutshell

Article Blog Image

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your...

Time [1]

Why We Can't Trust Network Time

Article Blog Image

“If you knew Time as well as I do,” said the Hatter, “ you wouldn’t talk about wasting it. It’s him.” “ I don’t know what you mean,” said Alice. “ Of course you don’t !” the Hatter said, tossing his head contemptuously. “ I dare say you never even spoke to Time ! Alice in Wonderland In ...

Proof-Of-StakeWork [1]

Introducing Proof-Of-StakeWork

Article Blog Image

[Note: This post requires background knowledge in blockchain technology. We have provided links to background information.] After determining a blockchain project’s reason for existence, the next most important decision developers and entrepreneurs must consider is the mechanism through which th...

Mining [1]

Introducing Proof-Of-StakeWork

Article Blog Image

[Note: This post requires background knowledge in blockchain technology. We have provided links to background information.] After determining a blockchain project’s reason for existence, the next most important decision developers and entrepreneurs must consider is the mechanism through which th...