The state of my exposure to cryptographic libraries
2016-09-30 14:56 by Ian
This is a quick overview of the cryptographic libraries I have deep experience with.
The Wrongness: Route and Identity
2016-09-25 01:46 by Ian
Of all the species of Wrongness I commonly observe in the wild, the conflation of Route and Identity is of particular concern at layer 7 of the OSI stack.
My collection of C-related rants
2016-09-24 22:54 by Ian
The thing that needs to be made clear is this: C is a permanent fixture. It is not going anywhere in your lifetime. You can use it, or not.
Intro to DTLS
2016-09-24 21:25 by Ian
This post is aimed at technical readers who know what TLS is used for, but may know nothing about its operation. It is also an attempt to explain why DTLS was developed, and how it applies to IoT.
Symmetrical asymmetries
2016-09-24 21:10 by Ian
This is one of a series of posts I will be writing that cover various security-related algorithms. This post will be a brief survey of the two major classes of reversible encryption algorithms.
CPLD is ready-to-rock
2016-07-04 00:03 by Ian
As of today, the CPLD is a solved-problem. All the design goals detailed in my prior post are satisfied and have been tested up-to ~5MHz input clock.
How will quantum computers impact cryptography?
2016-05-01 21:32 by Ian
This post is an effort to short-circuit some FUD regarding the susceptibility of different classes of cryptographic algorithms to attacks made possible by quantum computers.
Digitabulum Design Choices: CPLD
2016-03-12 23:15 by Ian
This is the third post in a series of posts detailing the rationale for design choices in our motion capture glove. I will try and anticipate questions that informed users will ask. This post will discuss the sequence of choices that culminated in r0's CPLD and give some indications of what was changed.
Open ports are not a security hole
2015-11-23 22:19 by Ian
What follows is an email I wrote for our sales department, which had to regularly field questions surrounding these issues when our VoIP product came up. The scary thing is that the misconception is most prevalent in the minds of people who should know better (engineers and sysadmins). So here is the most unpopular position you can possibly take in a group of network admins. Maybe it will help someone else dismantle some technical hear-say.
Excursion to the bare-metal: ARM Cortex vs MIPS
2015-11-18 12:16 by Ian
One of the projects I did for Microchip was a feasibility study of porting the ARM Cortex instruction set to comparable routines for MIPS. The ultimate goal for the chipKIT team is/was to port the Teensy3 audio library to their line of PIC32 dev boards. What follows is my report, along with some elaborations for readers who want the knowledge, but aren't yet level 60 mages.