On the secure delivery of regular information
Sending bills or medical diagnosis through cleartext email has obvious security problems, but forcing users to log into every service provider webpage to download updates has major usability problems and doesn’t scale. I propose a third alternative.
Last updated on 2020-09-28
4 min read
Enabling per-device traffic analysis with separate VLANs, 802.1x MAC based authentication, and OpenWRT
Why For analysing what devices do on a network - specifically the shared medium of a wireless LAN - just packet tracing based on IP address is often not sufficient. There are multicasts, the initial DHCP requests, and potentially other types of traffic not captured by that.
Last updated on 2020-12-18
9 min read
Transparent Tor-ifying VLAN (separated WLAN SSID) with OpenWRT
Why Tor allows to anonymize Internet traffic through onion routing, typically via 3 separate hops. At INS, we run one of the fastest Tor exit nodes in Austria, and provide statistical data on its usage.
Last updated on 2019-04-11
6 min read
[Finished Jan. 2008] Research into context-based device-to-device authentication.
[Finished Sept. 2014] Open source Ubiquitous Authentication Toolkit
[Finished Jan. 2008] Relative spatial positioning
[Finished/closed] A Linux firewall/UTM distribution with read-only root file system.
Gibaltar product web page
Design, Implementation, and Evaluation of Secure Communication for Line Current Differential Protection Systems over Packet Switched Networks
In this work we propose a secure communication concept for the protection of critical power supply and distribution infrastructure. …
JKU Tor exit node
[Running] High-bandwidth Tor exit node at JKU/INS for research on use of anonymization
[Finished/stopped] A personal Dropbox replacement based on Git