Published by naif September 26th, 2010
in security and technology.
My own ECC curve security and selection analysis
Most modern crypto use Elliptic Curve Cryptographic (ECC) that, with a smaller key size and reduce computation power, give equivalent security strength of traditional crypto system known as DH (Diffie-Hellman) or RSA (Rivest, Shamir and Adleman) .
Not everyone knows that ECC encryption is selected for any future encryption [...]
Published by naif September 25th, 2010
in security and technology.
I had a look at European Defense Agency website and found the ESSOR project, a working project funded for 106mln EUR to develop strategic defense communication products based on new Software Defined Radio approach.
SDR approach is a revolutionary system that’s completely changing the way scientist and industry is approach any kind of wireless technology.
Basically instead [...]
Published by naif September 12th, 2010
in business and management.
I had to better understand the concepts, roles and duties related to Product management and Product marketing management in software companies, why are needed, which are the differences and how they fit inside an organization structure.
Most person i know never interested into this specific area of work, but when you want to be a product [...]
Published by naif September 10th, 2010
in Privacy, interception and security.
I suggest reading remotely tapping VoIp phones” on VoIP Security Alliance Blog by Shawn Merdinger .
A concrete example on how current telephony infrastructure are getting more vulnerable to cyber attacks.