Home

  • Keyword Search

  • Post Date Range

Attestation

Inspecting Software

By Bryon Moyer | May 3, 2019 | 0 Comments

[From the last episode: We looked at hashing, showing how you can turn a block of data into a kind of signature.] You come home after work and you notice that the back door isn’t locked. One of those things that’s easy to forget when you’re in a hurry. So… […]

Read More
Hash

Hashing and Digital Signatures

By Bryon Moyer | April 26, 2019 | 0 Comments

[From the last episode: We looked at authorization – the permissions that different people or things have to see things on the network.] Let’s say that your IoT device sends a message to a server. Let’s say it’s a refrigerator, and it’s sending the message that you’re out of milk. […]

Read More
Authorization

Authorization: Permission to Do Stuff

By Bryon Moyer | April 19, 2019 | 0 Comments

[From the last episode: We looked at the various kinds of keys and how they can interact for authentication and data encryption.] So far, we’ve focused on the first of three A-words: authentication. The whole point of authentication is to make sure that someone getting onto the network is who […]

Read More
Keys

So Many Kinds of Key!

By Bryon Moyer | April 12, 2019 | 0 Comments

[From the last episode: We looked at an example of how authentication ensures that, when you establish a secure web connection, everyone is who they say they are.] Let’s talk some more about keys. And I’ll warn you: as hard as I’m going to try to make things clear, you […]

Read More

Proving that You’re You

By Bryon Moyer | April 5, 2019 | 0 Comments

[From the last episode: We looked at different kinds of keys used for encryption.] Let’s say you want to connect to a website. Yeah, I know, we’re supposed to be talking about the IoT, but using a web browser is more familiar and it uses the same concepts. So we’ll […]

Read More
Site by Consistent Image Web Design