Becoming an e-Estonian

Yesterday I picked up my Digital Identity card (ID card) for my Estonian e-residency. WTF you might say? Let me explain! Estonia has a long history of eGovernment and being a digital society, it is said to have one of the most sophisticated technology when it comes to digital identities and the legally binding signing of personal and administrative documents. The small, Eastern-european country, which suffered from but survived a cyber attack in 2007, is now exporting it’s expertise in digital identity and eGovernment.

Securing Dovecot and Postfix (Logjam Attack)

This week’s attack on TLS, called Logjam, did not come with a logo, to everyones surprise. I missed the good old attacks that don’t require artwork to grab attention :) In short, the attack pre-calculates parts of the discrete logarithm for the 512-bit variant. After that, a MITM would use a downgrade attack to force client and server to use old export-grade cryptography. According to the statistics of the Logjam authors, between 8.

ICMPv6 Captive Portal URI Option

Ever wondered how your wifi-capable device knows whether or not you are behind a captive portal? Well, depending on the implementation it is a ugly business, that involves DNS requests and fetching text files from well-known locations. This is an ugly solution to an even uglier problem. But there is hope! The (currently experimental) captive portal URI option as proposed in draft-wkumari-dhc-capport-12 might make things go smoother, as the information about an active captive portal is advertised in the IPv6 Router Advertisement.

IPv8

I just stumbled upon one of my early modern art masterpieces, which I can not keep you away from.

On pCell

Artemis recently announced that DISH was kind enough to lease spectrum in San Francisco to them. Now they can deploy the world’s first pCell (personal cell) network that has to proof itself outside the lab. Scaling cellular networks has become a real challenge lately. From using more spectrum to evolving the standards (LTE even has the word evolution in its name!). Cells have become smaller und cell tower networks are today more dense then ever before, requiring more bandwidth per tower and still being a significant investment for the mobile data network provider in charge.