Posts

The academic peer review process can often be frustrating — not only for junior members of the research community. In this blog …

Getting OPNsense to perform well on a low-powered CPU, e.g. the APU4d4 board, can be tricky. As there are some open questions, this …

Android has different types of lock states. This post summarizes what they are, what their purpose is, and how the interact.

I have been using KDE since 1998 and keep coming back to it even though I have tried Gnome in many versions and varients. A highly …

Sending bills or medical diagnosis through cleartext email has obvious security problems, but forcing users to log into every service …

The Flatpak package of the Zoom Linux client is better than installing native because of Flatpak sandboxing capabilites. This short …

Why For analysing what devices do on a network - specifically the shared medium of a wireless LAN - just packet tracing based on IP …

Git commands that are not intuitive but that I found useful

GadgetBridge for Android allows syncing locally with various wearable devices such as wristbands and watches. As they are typically …

Responsible/coordinated/timed disclosure is continuously a topic of heated debate, even more so when PoC (proof of concept) exploit …

Android security trade-offs: Rooting “Rooting” has been part of the Android ecosystem pretty much since its creation. Within the …

Android security trade-offs The Android ecosystem is highly diverse, complex, and has many different stakeholders typically not visible …

Why Tor allows to anonymize Internet traffic through onion routing, typically via 3 separate hops. At INS, we run one of the fastest …

Executive summary appjolt.com is seemingly an iOS and Android library/SDK to bundle with other apps. It is a special form of malware …

Disclaimer This web page is written primarily in English, but uses German words originating from the Austrian law. There seems to be …

Creating X.509 certificates programmatically in Java My probem statement was simple: create a X.509 certificate with only a few fields …

How to set up an OpenWRT router/gateway as an IPsec/L2TP gateway for Andoid and iPhone clients The only “reasonable” (that …

Introduction After (again) suffering under KMail’s recent sluggishness when dealing with my email spool and general Eclipse …

USB sticks become increasingly common to carry around. When one keeps confidential data on such an USB medium, it should be protected …

Introduction After some work on getting the Austrian Bürgerkarte to work under Linux, I have now decided to acquire some know-how about …