asteroza + forward   19

Microsoft Security Advisory 3042058
Currently a manual optional download, adds new PFS cipher suites to windows 7 and up
microsoft  windows  TLS  SSL  PFS  cipher  suite  update  upgrade  perfect  forward  secrecy  security  encryption  sysadmin  tips  tricks  Delicious 
may 2015 by asteroza
Pond - Pond
Interesting tor based async messaging server/protocol, sorta the encrypted equivalent of email without leaking too much metadata.
software  email  communication  encryption  forward  asynchronous  secure  messaging  security  tor  privacy  Delicious 
august 2013 by asteroza
Sounds a little like they are pushing some link layer information up into the TCP stack, breaking the OSI model a little...
coded  TCP  forward  error  correction  data  link  algorithm  software  communication  Delicious 
october 2012 by asteroza
Interesting wind turbine design, basically gives up on trying to capture energy from the center, and tries to capture tip shedding vortexes. Also it may not be obvious but it appears to use diffuser rings and is swept forward so air gets funneled towards the center, but the center hub cone forces the air back out towards the edges, possible increasing local velocity. A little surprising they don't fair the backside of the hub. Appears to use active tracking rather than a passive guide vane. Weight is an issue for a ringed fan design like this, so it won't scale up to megawatts, but since their target is quiet operations in residential areas, that isn't such a big deal.
wind  turbine  power  generator  green  energy  forward  swept  blade  annular  diffuser  ring  Delicious 
november 2011 by asteroza
Vanish Installation and Configuration
A system that uses a p2p network to store ephemeral encryption keys, so that an encrypted message can be decrypted within 8 hours of encryption, else the keys are lost forever. This obviously does not prevent someone from saving a plaintext copy of the decrypted message, but for practical purposes this is a self destructing message. I suppose if someone tried really hard, they could try to collect all keys from the network constantly and time reference them, then try a brute force attack using a limited key set.
Vanish  java  p2p  distributed  encryption  key  forward  secrecy  firefox  plugin  vuze  hash  table  cache  selfdestruct  message  security  privacy  anonymous  Delicious 
july 2009 by asteroza

related tags

2.0  aerodynamics  agent  aircraft  algorithm  ammonia  annular  anonymity  anonymous  apache  Apaclara  asynchronous  automotive  base  BBC  beaming  blade  cache  car  carbon  chemical  cipher  CO2  code  coded  communication  comunication  concurrent  configuration  correction  cryptography  data  Delicious  desalination  development  diffuser  dioxide  disposable  distributed  door  draw  email  encryption  energy  ephemeral  error  FEC  fiber  field  filetype:pdf  firefox  forward  forwarding  FSOA  generator  gradient  green  hardware  hash  high  hollow  ICMP  IIS  jamming  java  key  laser  LaserMotive  latency  link  logistics  lossy  low  media:document  membrane  message  messaging  microsoft  model  network  opensource  openVPN  osmosis  osmotic  outpost  p2p  perfect  PFS  platform  plugin  power  powershell  pressure  privacy  programming  propeller  proxy  pseudoanonymous  purification  RC  remote  resistant  reverse  ring  salt  saltwater  script  seawater  secrecy  secure  security  self-destruct  selfdestruct  sensor  seperable  server  service  sliding  software  solution  SSL  steganography  SUAS  suite  supply  swept  sysadmin  table  TCP  technology  temporary  tips  TLS  tor  traffic  tricks  tunnel  turbine  UAS  UAV  UDP  update  upgrade  URL  Vanish  VPN  vuze  water  web  webdev  webserver  whspr  wind  windows 

Copy this bookmark: