English flagItalian flagKorean flagChinese (Simplified) flagChinese (Traditional) flagPortuguese flagGerman flagFrench flagSpanish flagJapanese flagArabic flagRussian flagGreek flagDutch flagBulgarian flagCzech flagCroatian flagDanish flagFinnish flagHindi flagPolish flagRomanian flagSwedish flagNorwegian flag
Catalan flagFilipino flagHebrew flagIndonesian flagLatvian flagLithuanian flagSerbian flagSlovak flagSlovenian flagUkrainian flagVietnamese flagAlbanian flagEstonian flagGalician flagMaltese flagThai flagTurkish flagHungarian flagBelarus flagIrish flagIcelandic flagMacedonian flagMalay flagPersian flag

Archive for September, 2010

Not every elliptic curve is the same: trough on ECC security

My own ECC curve security and selection analysis

Most modern crypto use Elliptic Curve Cryptographic (ECC) that, with a smaller key size and reduce computation power, give equivalent security strength of traditional crypto system known as DH (Diffie-Hellman) or RSA (Rivest, Shamir and Adleman) .
Not everyone knows that ECC encryption is selected for any future encryption [...]

ESSOR, European Secure Software Defined Radio (SDR)

I had a look at European Defense Agency website and found the ESSOR project, a working project funded for 106mln EUR to develop strategic defense communication products based on new Software Defined Radio approach.
SDR approach is a revolutionary system that’s completely changing the way scientist and industry is approach any kind of wireless technology.
Basically instead [...]

Product management and organization

I had to better understand the concepts, roles and duties related to Product management and Product marketing management in software companies, why are needed, which are the differences and how they fit inside an organization structure.
Most person i know never interested into this specific area of work, but when you want to be a product [...]

Remotely intercepting snom VoIP phones

I suggest reading remotely tapping VoIp phones” on VoIP Security Alliance Blog by Shawn Merdinger .
A concrete example on how current telephony infrastructure are getting more vulnerable to cyber attacks.


You are currently browsing the Playhouse of privacy, security, hacking, encryption, intelligence and some business stuff weblog archives for the month September, 2010.

Longer entries are truncated. Click the headline of an entry to read it in its entirety.