Tags


#News [2]

DarkMatter and industrial IoT security

Article Blog Image

On Monday, Bleeping Computer published an article about the disturbing revelation that Dark Matter, a cybersecurity firm based in the United Arab Emirates, has aspirations to become a trusted root certificate authority in one of the world’s most popular web browsers. A certificate authority (CA)...

Breaking new ground in IoT

Article Blog Image

After months of incubation we’re excited to start talking about our new, we believe groundbreaking, initiative: DiodeSM Incubating within Exosite, we’ve been working hard to fix some of the fundamental shortcomings of PKI that are underlying 99% of all Internet communication today. For the first...

#Blockchain [18]

Best Resources To Learn Web3 Blockchain Decentralized Pki And Ethereum

Article Blog Image

Here is a curated list of readings and resources that ignited our interest in realizing a decentralized Public Key Infrastructure (PKI) vision for the future. We included topics such as fundamentals, Web3, blockchain, web PKI, DNS, time, IoT security, light clients, Ethereum, as well as developme...

How The Experts Are Approaching The Intersection Of Blockchain And Iot

Article Blog Image

Blockchain and Internet of Things (IoT) technologies have each received a lot of attention from industry researchers and investors alike over the past few years. However, it is only recently that the two technologies have begun to be considered together allowing participants to reimagine the pote...

Why Dns On Blockchain Is The Next Step After Dns Over Https

Article Blog Image

Last month, the trade association for internet service providers in the U.K. has nominated Mozilla for this year’s award of Internet Villain because Mozilla plans to support DNS-over-HTTPS that would bypass U.K. filtering obligations and parental controls, undermining internet standards in the U....

Vitalik Buterin At Radicalxchange Taipei On Harberger Taxes

Article Blog Image

On Tuesday (7/16), Vitalik Buterin, the creator of Ethereum, gave a 30-minute presentation entitled, “Harberger taxes for virtual property.” In his presentation (18 slides in English and Mandarin) at the first event of RadicalxChange Taipei, Vitalik looked at what Harberger taxes are and what are...

Hardware Requirements Of Blockchain Clients

Article Blog Image

You just decided to start your next project using blockchain. That is awesome congrats! But now you face the many choices: Which blockchain platform and clients are technically suited for your use case? Makers and IoT specialists know that when designing embedded systems it’s important to unders...

Blockquick Reputation System

Article Blog Image

China social credit system: the method to reward or punish citizens for their behavior is unclear First announced in 2014, the Chinese government has been implementing a controversial social credit system. The system uses secret algorithms to evaluate the behavior of Chinese citizens, monitor th...

Blockquick Consensus Reputation Table Explained

Article Blog Image

Download full paper here (PDF). Diode’s CTO Dominic Letz published a paper recently to give an introduction of BlockQuick, a super light client protocol for blockchain validation on constrained devices. One of the key concepts behind the newly proposed BlockQuick is that it plans to adopt a cons...

Why The Internet Infrastructure Is Vulnerable To Bgp Hijacking Attacks

Article Blog Image

Earlier this month, Doug Madory, Oracle’s director of internet analysis, wrote in a blog post detailing a BGP route leak incident happened on Thursday, June 6. For approximately two hours, a massive amount of European Internet traffic was rerouted through China Telecom’s own servers. The Internet...

Proof Of Stakework A Community Vision

Article Blog Image

[Note: This post is a follow-on discussion to topics discussed in Introducing Proof-Of-StakeWork and requires some background knowledge in blockchain technology.] In the last post on Proof-Of-StakeWork we talked about some of the advantages and disadvantages of both Proof-Of-Work (POW) and Proof...

Blockquick Super Light Blockchain Client For Trustless Time

Article Blog Image

- Click here if you just want to read the Paper - In the last two posts of this series, we first introduced the governance issues in PKI and then the circular dependency between establishing trust in PKI certificates and establishing the current time on a connected device. So let’s break that c...

From Software Defined Networking to Blockchain Defined Networking

Article Blog Image

Software Defined Networking (SDN) and Network virtualization have been the disruptor technologies that were fundamental to the success of Infrastructure as a Service (IaaS) providers such as Amazon AWS, Google Cloud Compute, and Azure during the last decade. Before that, there were plenty of riva...

The impact of decentralized infrastructure on wireless communications

Article Blog Image

The Diode Network enables practical distributed trust for IoT communications (and for other modalities as well). The implications of this for distributed IT infrastructure are significant. However, as the reality of distributed infrastructure emerges, other more immediate applications on the wa...

Introducing Proof-Of-StakeWork

Article Blog Image

[Note: This post requires background knowledge in blockchain technology. We have provided links to background information.] After determining a blockchain project’s reason for existence, the next most important decision developers and entrepreneurs must consider is the mechanism through which th...

Breaking new ground in IoT

Article Blog Image

After months of incubation we’re excited to start talking about our new, we believe groundbreaking, initiative: DiodeSM Incubating within Exosite, we’ve been working hard to fix some of the fundamental shortcomings of PKI that are underlying 99% of all Internet communication today. For the first...

#Burning Platform [6]

Kazakhstan Mitm Can Be Prevented With Decentralized Pki

Article Blog Image

OMG! So it happens again. PKI the Public Key Infrastructure is a centrally rooted security infrastructure to encrypt nearly all of todays internet traffic. And is being used to crack all traffic in Kazakhstan. Yesterday on the 18h of July 2019, the state-owned telecommunications organization of ...

Blockquick Super Light Blockchain Client For Trustless Time

Article Blog Image

- Click here if you just want to read the Paper - In the last two posts of this series, we first introduced the governance issues in PKI and then the circular dependency between establishing trust in PKI certificates and establishing the current time on a connected device. So let’s break that c...

Why We Can't Trust Network Time

Article Blog Image

“If you knew Time as well as I do,” said the Hatter, “ you wouldn’t talk about wasting it. It’s him.” “ I don’t know what you mean,” said Alice. “ Of course you don’t !” the Hatter said, tossing his head contemptuously. “ I dare say you never even spoke to Time ! Alice in Wonderland In ...

Decentralized PKI in a nutshell

Article Blog Image

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your...

DarkMatter and industrial IoT security

Article Blog Image

On Monday, Bleeping Computer published an article about the disturbing revelation that Dark Matter, a cybersecurity firm based in the United Arab Emirates, has aspirations to become a trusted root certificate authority in one of the world’s most popular web browsers. A certificate authority (CA)...

#PKI [9]

Best Resources To Learn Web3 Blockchain Decentralized Pki And Ethereum

Article Blog Image

Here is a curated list of readings and resources that ignited our interest in realizing a decentralized Public Key Infrastructure (PKI) vision for the future. We included topics such as fundamentals, Web3, blockchain, web PKI, DNS, time, IoT security, light clients, Ethereum, as well as developme...

Kazakhstan Mitm Can Be Prevented With Decentralized Pki

Article Blog Image

OMG! So it happens again. PKI the Public Key Infrastructure is a centrally rooted security infrastructure to encrypt nearly all of todays internet traffic. And is being used to crack all traffic in Kazakhstan. Yesterday on the 18h of July 2019, the state-owned telecommunications organization of ...

The impact of decentralized infrastructure on wireless communications

Article Blog Image

The Diode Network enables practical distributed trust for IoT communications (and for other modalities as well). The implications of this for distributed IT infrastructure are significant. However, as the reality of distributed infrastructure emerges, other more immediate applications on the wa...

Decentralized PKI in a nutshell

Article Blog Image

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your...

DarkMatter and industrial IoT security

Article Blog Image

On Monday, Bleeping Computer published an article about the disturbing revelation that Dark Matter, a cybersecurity firm based in the United Arab Emirates, has aspirations to become a trusted root certificate authority in one of the world’s most popular web browsers. A certificate authority (CA)...

#Industrial IoT [2]

DarkMatter and industrial IoT security

Article Blog Image

On Monday, Bleeping Computer published an article about the disturbing revelation that Dark Matter, a cybersecurity firm based in the United Arab Emirates, has aspirations to become a trusted root certificate authority in one of the world’s most popular web browsers. A certificate authority (CA)...

#Distributed Infrastructure [6]

Why Dns On Blockchain Is The Next Step After Dns Over Https

Article Blog Image

Last month, the trade association for internet service providers in the U.K. has nominated Mozilla for this year’s award of Internet Villain because Mozilla plans to support DNS-over-HTTPS that would bypass U.K. filtering obligations and parental controls, undermining internet standards in the U....

From Software Defined Networking to Blockchain Defined Networking

Article Blog Image

Software Defined Networking (SDN) and Network virtualization have been the disruptor technologies that were fundamental to the success of Infrastructure as a Service (IaaS) providers such as Amazon AWS, Google Cloud Compute, and Azure during the last decade. Before that, there were plenty of riva...

The impact of decentralized infrastructure on wireless communications

Article Blog Image

The Diode Network enables practical distributed trust for IoT communications (and for other modalities as well). The implications of this for distributed IT infrastructure are significant. However, as the reality of distributed infrastructure emerges, other more immediate applications on the wa...

Decentralized PKI in a nutshell

Article Blog Image

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your...

#Development [2]

Hardware Requirements Of Blockchain Clients

Article Blog Image

You just decided to start your next project using blockchain. That is awesome congrats! But now you face the many choices: Which blockchain platform and clients are technically suited for your use case? Makers and IoT specialists know that when designing embedded systems it’s important to unders...

Decentralized PKI in a nutshell

Article Blog Image

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your...

#Security [12]

Why Dns On Blockchain Is The Next Step After Dns Over Https

Article Blog Image

Last month, the trade association for internet service providers in the U.K. has nominated Mozilla for this year’s award of Internet Villain because Mozilla plans to support DNS-over-HTTPS that would bypass U.K. filtering obligations and parental controls, undermining internet standards in the U....

Why The Internet Infrastructure Is Vulnerable To Bgp Hijacking Attacks

Article Blog Image

Earlier this month, Doug Madory, Oracle’s director of internet analysis, wrote in a blog post detailing a BGP route leak incident happened on Thursday, June 6. For approximately two hours, a massive amount of European Internet traffic was rerouted through China Telecom’s own servers. The Internet...

Blockquick Super Light Blockchain Client For Trustless Time

Article Blog Image

- Click here if you just want to read the Paper - In the last two posts of this series, we first introduced the governance issues in PKI and then the circular dependency between establishing trust in PKI certificates and establishing the current time on a connected device. So let’s break that c...

From Software Defined Networking to Blockchain Defined Networking

Article Blog Image

Software Defined Networking (SDN) and Network virtualization have been the disruptor technologies that were fundamental to the success of Infrastructure as a Service (IaaS) providers such as Amazon AWS, Google Cloud Compute, and Azure during the last decade. Before that, there were plenty of riva...

The impact of decentralized infrastructure on wireless communications

Article Blog Image

The Diode Network enables practical distributed trust for IoT communications (and for other modalities as well). The implications of this for distributed IT infrastructure are significant. However, as the reality of distributed infrastructure emerges, other more immediate applications on the wa...

Why We Can't Trust Network Time

Article Blog Image

“If you knew Time as well as I do,” said the Hatter, “ you wouldn’t talk about wasting it. It’s him.” “ I don’t know what you mean,” said Alice. “ Of course you don’t !” the Hatter said, tossing his head contemptuously. “ I dare say you never even spoke to Time ! Alice in Wonderland In ...

Decentralized PKI in a nutshell

Article Blog Image

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your...

#Time [2]

Blockquick Super Light Blockchain Client For Trustless Time

Article Blog Image

- Click here if you just want to read the Paper - In the last two posts of this series, we first introduced the governance issues in PKI and then the circular dependency between establishing trust in PKI certificates and establishing the current time on a connected device. So let’s break that c...

Why We Can't Trust Network Time

Article Blog Image

“If you knew Time as well as I do,” said the Hatter, “ you wouldn’t talk about wasting it. It’s him.” “ I don’t know what you mean,” said Alice. “ Of course you don’t !” the Hatter said, tossing his head contemptuously. “ I dare say you never even spoke to Time ! Alice in Wonderland In ...

#Mining [2]

Proof Of Stakework A Community Vision

Article Blog Image

[Note: This post is a follow-on discussion to topics discussed in Introducing Proof-Of-StakeWork and requires some background knowledge in blockchain technology.] In the last post on Proof-Of-StakeWork we talked about some of the advantages and disadvantages of both Proof-Of-Work (POW) and Proof...

Introducing Proof-Of-StakeWork

Article Blog Image

[Note: This post requires background knowledge in blockchain technology. We have provided links to background information.] After determining a blockchain project’s reason for existence, the next most important decision developers and entrepreneurs must consider is the mechanism through which th...

#Proof-Of-StakeWork [2]

Proof Of Stakework A Community Vision

Article Blog Image

[Note: This post is a follow-on discussion to topics discussed in Introducing Proof-Of-StakeWork and requires some background knowledge in blockchain technology.] In the last post on Proof-Of-StakeWork we talked about some of the advantages and disadvantages of both Proof-Of-Work (POW) and Proof...

Introducing Proof-Of-StakeWork

Article Blog Image

[Note: This post requires background knowledge in blockchain technology. We have provided links to background information.] After determining a blockchain project’s reason for existence, the next most important decision developers and entrepreneurs must consider is the mechanism through which th...

#Wireless Communications [1]

The impact of decentralized infrastructure on wireless communications

Article Blog Image

The Diode Network enables practical distributed trust for IoT communications (and for other modalities as well). The implications of this for distributed IT infrastructure are significant. However, as the reality of distributed infrastructure emerges, other more immediate applications on the wa...

#IoT [3]

How The Experts Are Approaching The Intersection Of Blockchain And Iot

Article Blog Image

Blockchain and Internet of Things (IoT) technologies have each received a lot of attention from industry researchers and investors alike over the past few years. However, it is only recently that the two technologies have begun to be considered together allowing participants to reimagine the pote...

Hardware Requirements Of Blockchain Clients

Article Blog Image

You just decided to start your next project using blockchain. That is awesome congrats! But now you face the many choices: Which blockchain platform and clients are technically suited for your use case? Makers and IoT specialists know that when designing embedded systems it’s important to unders...

The impact of decentralized infrastructure on wireless communications

Article Blog Image

The Diode Network enables practical distributed trust for IoT communications (and for other modalities as well). The implications of this for distributed IT infrastructure are significant. However, as the reality of distributed infrastructure emerges, other more immediate applications on the wa...

#BDN [1]

From Software Defined Networking to Blockchain Defined Networking

Article Blog Image

Software Defined Networking (SDN) and Network virtualization have been the disruptor technologies that were fundamental to the success of Infrastructure as a Service (IaaS) providers such as Amazon AWS, Google Cloud Compute, and Azure during the last decade. Before that, there were plenty of riva...

#DPKI [3]

Best Resources To Learn Web3 Blockchain Decentralized Pki And Ethereum

Article Blog Image

Here is a curated list of readings and resources that ignited our interest in realizing a decentralized Public Key Infrastructure (PKI) vision for the future. We included topics such as fundamentals, Web3, blockchain, web PKI, DNS, time, IoT security, light clients, Ethereum, as well as developme...

#Eclipse Attack [1]

#DDoS [1]

#Decentralized Web [1]

#BGP Hijacking [1]

Why The Internet Infrastructure Is Vulnerable To Bgp Hijacking Attacks

Article Blog Image

Earlier this month, Doug Madory, Oracle’s director of internet analysis, wrote in a blog post detailing a BGP route leak incident happened on Thursday, June 6. For approximately two hours, a massive amount of European Internet traffic was rerouted through China Telecom’s own servers. The Internet...

#Blockquick [3]

Hardware Requirements Of Blockchain Clients

Article Blog Image

You just decided to start your next project using blockchain. That is awesome congrats! But now you face the many choices: Which blockchain platform and clients are technically suited for your use case? Makers and IoT specialists know that when designing embedded systems it’s important to unders...

Blockquick Reputation System

Article Blog Image

China social credit system: the method to reward or punish citizens for their behavior is unclear First announced in 2014, the Chinese government has been implementing a controversial social credit system. The system uses secret algorithms to evaluate the behavior of Chinese citizens, monitor th...

Blockquick Consensus Reputation Table Explained

Article Blog Image

Download full paper here (PDF). Diode’s CTO Dominic Letz published a paper recently to give an introduction of BlockQuick, a super light client protocol for blockchain validation on constrained devices. One of the key concepts behind the newly proposed BlockQuick is that it plans to adopt a cons...

#Consensus Reputation Table [1]

Blockquick Consensus Reputation Table Explained

Article Blog Image

Download full paper here (PDF). Diode’s CTO Dominic Letz published a paper recently to give an introduction of BlockQuick, a super light client protocol for blockchain validation on constrained devices. One of the key concepts behind the newly proposed BlockQuick is that it plans to adopt a cons...

#Reputation [1]

Blockquick Reputation System

Article Blog Image

China social credit system: the method to reward or punish citizens for their behavior is unclear First announced in 2014, the Chinese government has been implementing a controversial social credit system. The system uses secret algorithms to evaluate the behavior of Chinese citizens, monitor th...

#Harberger taxes [1]

Vitalik Buterin At Radicalxchange Taipei On Harberger Taxes

Article Blog Image

On Tuesday (7/16), Vitalik Buterin, the creator of Ethereum, gave a 30-minute presentation entitled, “Harberger taxes for virtual property.” In his presentation (18 slides in English and Mandarin) at the first event of RadicalxChange Taipei, Vitalik looked at what Harberger taxes are and what are...

#Decentralization [4]

Best Resources To Learn Web3 Blockchain Decentralized Pki And Ethereum

Article Blog Image

Here is a curated list of readings and resources that ignited our interest in realizing a decentralized Public Key Infrastructure (PKI) vision for the future. We included topics such as fundamentals, Web3, blockchain, web PKI, DNS, time, IoT security, light clients, Ethereum, as well as developme...

Kazakhstan Mitm Can Be Prevented With Decentralized Pki

Article Blog Image

OMG! So it happens again. PKI the Public Key Infrastructure is a centrally rooted security infrastructure to encrypt nearly all of todays internet traffic. And is being used to crack all traffic in Kazakhstan. Yesterday on the 18h of July 2019, the state-owned telecommunications organization of ...

Vitalik Buterin At Radicalxchange Taipei On Harberger Taxes

Article Blog Image

On Tuesday (7/16), Vitalik Buterin, the creator of Ethereum, gave a 30-minute presentation entitled, “Harberger taxes for virtual property.” In his presentation (18 slides in English and Mandarin) at the first event of RadicalxChange Taipei, Vitalik looked at what Harberger taxes are and what are...

#Resources [1]

Best Resources To Learn Web3 Blockchain Decentralized Pki And Ethereum

Article Blog Image

Here is a curated list of readings and resources that ignited our interest in realizing a decentralized Public Key Infrastructure (PKI) vision for the future. We included topics such as fundamentals, Web3, blockchain, web PKI, DNS, time, IoT security, light clients, Ethereum, as well as developme...

#Reading list [1]

Best Resources To Learn Web3 Blockchain Decentralized Pki And Ethereum

Article Blog Image

Here is a curated list of readings and resources that ignited our interest in realizing a decentralized Public Key Infrastructure (PKI) vision for the future. We included topics such as fundamentals, Web3, blockchain, web PKI, DNS, time, IoT security, light clients, Ethereum, as well as developme...

#Web3 [1]

Best Resources To Learn Web3 Blockchain Decentralized Pki And Ethereum

Article Blog Image

Here is a curated list of readings and resources that ignited our interest in realizing a decentralized Public Key Infrastructure (PKI) vision for the future. We included topics such as fundamentals, Web3, blockchain, web PKI, DNS, time, IoT security, light clients, Ethereum, as well as developme...

#Ethereum [1]

Best Resources To Learn Web3 Blockchain Decentralized Pki And Ethereum

Article Blog Image

Here is a curated list of readings and resources that ignited our interest in realizing a decentralized Public Key Infrastructure (PKI) vision for the future. We included topics such as fundamentals, Web3, blockchain, web PKI, DNS, time, IoT security, light clients, Ethereum, as well as developme...