New blog, again
This must be the third blog I start from scratch. But this time, I’m taking a serious commitment: I’m going to write here regularly. Wish me luck!
View ArticlePrime numbers and universe factories
I’m a XKCD fan, and I look it up regularly. There’s a comic that I particularly enjoyed: Pi Equals. The comic Pi Equals, from XKCD.com (CC-BY-NC 2.5). Well, it appears that Randall was right in that...
View ArticleAre LXC and Docker secure?
Since its initial release in 2008, LXC has become widespread among servers. Today, it is becoming the preferred deployment strategy in many contexts, also thanks to Docker and, more recently, LXD. LXC...
View ArticleRunning Ubuntu Snappy inside Docker
Many of you may have already heard of Ubuntu Core. For those who haven’t, it’s a minimal Ubuntu version, running only a few essential services and ships with a new package manager (snappy) that...
View ArticleLet’s Encrypt: the road towards a better web?
I’ve always dreamed of a encrypted web, where HTTPS is the standard and plain HTTP is no more. A web where eavesdropping or manipulating information is not possible, or at least much harder than today....
View ArticleElliptic Curve Cryptography: a gentle introduction
Those of you who know what public-key cryptography is may have already heard of ECC, ECDH or ECDSA. The first is an acronym for Elliptic Curve Cryptography, the others are names for algorithms based on...
View ArticleElliptic Curve Cryptography: finite fields and discrete logarithms
This post is the second in the series ECC: a gentle introduction. In the previous post, we have seen how elliptic curves over the real numbers can be used to define a group. Specifically, we have...
View ArticleElliptic Curve Cryptography: ECDH and ECDSA
This post is the third in the series ECC: a gentle introduction. In the previous posts, we have seen what an elliptic curve is and we have defined a group law in order to do some math with the points...
View ArticleElliptic Curve Cryptography: breaking security and a comparison with RSA
This post is the fourth and last in the series ECC: a gentle introduction. In the last post we have seen two algorithms, ECDH and ECDSA, and we have seen how the discrete logarithm problem for elliptic...
View ArticleLet’s Encrypt is going to start soon
Let’s Encrypt (the free, automated and open certificate authority) has just announced its launch schedule. According to it, certificates will be released to the public starting from the week of...
View Article
More Pages to Explore .....