joost

453 posts

joost banner
joost

joost

@joostd

Netherlands Beigetreten Mart 2008
746 Folgt166 Follower
joost
joost@joostd·
@TimCallan Who are those researchers? Was there something published recently that I missed?
English
0
0
0
9
joost retweetet
Ronnie Manning
Ronnie Manning@RCManning·
Exciting news from @Yubico! You can now purchase the #YubiKey 5 Series and Security Key Series with new 5.7 firmware, featuring increased passkey storage and expanded security. Check out our latest blog to get your hands on them for yourself. sprou.tt/1ZV2S5ty51w
English
0
1
1
95
joost retweetet
Graham Hutton
Graham Hutton@haskellhutt·
Interested in learning Haskell? The full set of 16 videos from my introductory course based on the book "Programming in Haskell" is now freely available on YouTube. Happy Haskelling :-) tinyurl.com/haskell-notts
English
7
141
499
41.3K
joost
joost@joostd·
Stumbled upon this gem last night. A recording of a lecture by the late Richard Bird on programming algebra, given at my Alma Mater in 1986. Also reminds me of the lectures by Lambert Meertens where he often ran out of Squiggol operator symbols. ⊗⊛⦿△ podcasts.ox.ac.uk/introduction-t…
joost tweet media
English
0
0
1
74
joost
joost@joostd·
Another fun holiday project from @smallsteplabs: authenticate to your Wifi network using certificates and enrol your Apple devices automatically using #ACME Device Attestation. You bring your access point, they bring their CA and RADIUS server. smallstep.com/blog/home-netw…
English
0
0
0
61
joost retweetet
Ryan Hurst
Ryan Hurst@rmhrisk·
Did you know there are approximately 85 organizations authorized to issue TLS certificates for the web today? Or that seven of them issue 99% of all certificates currently in use? The presence of the others is largely intended to accommodate web openness and national sovereignty—an admirable goal, albeit one that introduces a significant attack surface for every web user. But were you aware that the recent eIDAS legislation, that was just signed, will obligate browsers to trust all QWAC-approved CAs listed on the EU Trust List (esignature.ec.europa.eu/efda/tl-browser)? To illustrate, Spain has 13 CAs approved to issue these certificates and there are 27 member states in the EU. Additionally, did you know the legislation will not permit browsers to remove of CA with a history of repeated incompetence without government approval? The most famous of all CA distrust events was an EU CA known as DigiNotar, and those in the PKI space might say that 12 years ago and today, the Conformity Assessment Bodies would have caught that and dealt with it proactively. But is that true? Check out the history of Camerfirma (wiki.mozilla.org/CA/Camerfirma_…) and wonder why an organization with such poor operational practices that the internet isn't dependent on is still trusted by anyone? Then ask why the associated CAB still lets it be approved as a CA for issuance. For those who say that the web doesn't need Browsers for such actions, consider this recent incident involving a Turkish CA (bugzilla.mozilla.org/show_bug.cgi?i…). And for those who doubt governments would use CAs to gain visibility into web traffic, take a look at this case where a French CA was doing just that: arstechnica.com/information-te…. Supposedly the final text has a recital that was added to the language to suggest that the scope of these requirements is to be limited to trusting these CAs for identity information and not the domain but the document is still private so we don't know for sure. Even if true recitals are not binding and the bill has other issues, for example, it requires browsers to reinstate user interface that has been proven to be harmful and misleading to users. arstechnica.com/information-te…. It also prevents the Browsers from establishing additional requirements for the CAs above and beyond what is included in the associated EU legislation, for example, they won't be subject to certificate.transparency.dev which has helped catch many many issues. All this means calcifying the web making it impossible to move forward without legislative change and leaving the web less secure at the same time. Change will now be governed by regulators, lobbyists, and standards boffins that either benefit from this weakening of the web or have no accountability for its consequences. There are 195 sovereign nations in this world. each would love to be in a position to observe everything their citizens and everyone who interacts with them does. When the world's most liberal and democratic governments put into place the tools to enable mass surveillance and weaken internet security in this fashion what makes us think the rest won't as well.
English
3
48
127
19.5K
joost
joost@joostd·
There's something strange with Safari's #webauthn implementation when using #FIDO #U2F security keys. The RP ID Hash returned from the key doesn't match. We see this in Safari 16.0 and 16.1 on MacOS. Anyone able to test with other versions? Try here: rpid.joostd.nl
English
1
0
1
0
joost
joost@joostd·
Also see @danboneh's story on how to authenticate photo's that have been post-processed @boneh/using-zk-proofs-to-fight-disinformation-17e7d57fe52f" target="_blank" rel="nofollow noopener">medium.com/@boneh/using-z…
English
1
0
0
47
joost
joost@joostd·
As a former Technical Product Manager for DNS services offered to Dutch R&E by @SURF_NL, I can appreciate this speaker gift from the @tweakers developers summit today!
joost tweet media
English
0
0
6
217