summaryrefslogtreecommitdiff
path: root/blog
diff options
context:
space:
mode:
Diffstat (limited to 'blog')
-rw-r--r--blog/index.html20
1 files changed, 10 insertions, 10 deletions
diff --git a/blog/index.html b/blog/index.html
index 52affc8..ed7f2b8 100644
--- a/blog/index.html
+++ b/blog/index.html
@@ -39,7 +39,7 @@
</div>
</div>
- <div class="card"><h2><a href="/blog/telekom-gpon-sfp/">Ubiquiti EdgeRouter on Deutsche Telekom GPON Fiber</a></h2><strong>2022-02-21</strong>
+ <div class="card"><h3><a href="/blog/telekom-gpon-sfp/">Ubiquiti EdgeRouter on Deutsche Telekom GPON Fiber</a></h3><strong>2022-02-21</strong>
<div class="summary">
Disclaimer I provide this guide as a reference for other knowledgeable users without any warranty. Please feel free to use this as a resource but do not hold me responsible if this does not work for you. There is a significant chance that due to an error on my side or due to Telekom changing their setup this guide will not work for you, and you may end up having to pay for an unsuccessful Telekom technician visit.
@@ -47,7 +47,7 @@
</div>
</div>
- <div class="card"><h2><a href="/blog/ihsm-worlds-first-diy-hsm/">New Paper on Inertial Hardware Security Modules</a></h2><strong>2021-11-23</strong>
+ <div class="card"><h3><a href="/blog/ihsm-worlds-first-diy-hsm/">New Paper on Inertial Hardware Security Modules</a></h3><strong>2021-11-23</strong>
<div class="summary">
World's First DIY HSM Last week, Prof. Dr. Björn Scheuermann and I have published our first joint paper on Hardware Security Modules. In our paper, we introduce Inertial Hardware Security Modules (IHSMs), a new way of building high-security HSMs from basic components. I think the technology we demonstrate in our paper might allow some neat applications where some civil organization deploys a service that no one, not even they themselves, can snoop on.
@@ -55,7 +55,7 @@
</div>
</div>
- <div class="card"><h2><a href="/blog/kicad-mesh-plugin/">Kicad Mesh Plugin</a></h2><strong>2020-08-18</strong>
+ <div class="card"><h3><a href="/blog/kicad-mesh-plugin/">Kicad Mesh Plugin</a></h3><strong>2020-08-18</strong>
<div class="summary">
Tamper Detection Meshes Cryptography is at the foundation of our modern, networked world. From email to card payment infrastructure in brick and mortar stores, cryptographic keys secure almost every part of our digital lives againts cybercriminals or curious surveillance capitalists. Without cryptography, many of the things we routinely do in our lives such as paying for groceries with a credit card, messaging a friend on Signal or unlocking a car with its keyfob would not be possible.
@@ -63,7 +63,7 @@
</div>
</div>
- <div class="card"><h2><a href="/blog/private-contact-discovery/">Private Contact Discovery</a></h2><strong>2019-06-22</strong>
+ <div class="card"><h3><a href="/blog/private-contact-discovery/">Private Contact Discovery</a></h3><strong>2019-06-22</strong>
<div class="summary">
Private Contact Discovery Private Contact Discovery (PCD) is the formal name for the problem modern smartphone messenger applications have on installation: Given a user's address book, find out which of their contacts also use the same messenger without the messenger's servers learning anything about the user's address book. The widespread non-private way to do this is to simply upload the user's address book to the app's operator's servers and do an SQL JOIN keyed on the phone number field against the database of registered users.
@@ -71,7 +71,7 @@
</div>
</div>
- <div class="card"><h2><a href="/blog/hsm-basics/">Hardware Security Module Basics</a></h2><strong>2019-05-17</strong>
+ <div class="card"><h3><a href="/blog/hsm-basics/">Hardware Security Module Basics</a></h3><strong>2019-05-17</strong>
<div class="summary">
Hardware Security Modules and Security Research and Cryptography On May 17 2019 I gave a short presentation on the fundamentals of hardware security modules at the weekly seminar of Prof. Mori's security research working group at Waseda University. The motivation for this was that outside of low-level hardware security people and people working in the financial industry HSMs are not thought about that often. In particular most network or systems security people would not consider them an option.
@@ -79,7 +79,7 @@
</div>
</div>
- <div class="card"><h2><a href="/blog/serial-protocols/">How to talk to your microcontroller over serial</a></h2><strong>2018-05-19</strong>
+ <div class="card"><h3><a href="/blog/serial-protocols/">How to talk to your microcontroller over serial</a></h3><strong>2018-05-19</strong>
<div class="summary">
Scroll to the end for the TL;DR.
@@ -89,7 +89,7 @@ If you have done low-level microcontroller firmware you will regularly have had
</div>
</div>
- <div class="card"><h2><a href="/blog/thors-hammer/">Thor&#39;s Hammer</a></h2><strong>2018-05-03</strong>
+ <div class="card"><h3><a href="/blog/thors-hammer/">Thor&#39;s Hammer</a></h3><strong>2018-05-03</strong>
<div class="summary">
In case you were having an inferiority complex because your friends' IBM Model M keyboards are so much louder than the shitty rubber dome freebie you got with your pc... Here's the solution: Thor's Hammer, a simple typing cadence enhancer for PS/2 keyboards.
@@ -98,7 +98,7 @@ Your browser does not support the HTML5 video tag. A demonstration of the comple
</div>
</div>
- <div class="card"><h2><a href="/blog/multichannel-led-driver/">32-Channel LED tape driver</a></h2><strong>2018-05-02</strong>
+ <div class="card"><h3><a href="/blog/multichannel-led-driver/">32-Channel LED tape driver</a></h3><strong>2018-05-02</strong>
<div class="summary">
Theoretical basics Together, a friend and I outfitted the small staircase at Berlin's Chaos Computer Club with nice, shiny RGB-WW LED tape for ambient lighting. This tape is like regular RGB tape but with an additional warm white channel, which makes for much more natural pastels and whites. There are several variants of RGBW tape. Cheap ones have separate RGB and white LEDs, which is fine for indirect lighting but does not work for direct lighting.
@@ -106,7 +106,7 @@ Your browser does not support the HTML5 video tag. A demonstration of the comple
</div>
</div>
- <div class="card"><h2><a href="/blog/wifi-led-driver/">Wifi Led Driver</a></h2><strong>2018-05-02</strong>
+ <div class="card"><h3><a href="/blog/wifi-led-driver/">Wifi Led Driver</a></h3><strong>2018-05-02</strong>
<div class="summary">
Project motivation The completed driver board installed in the 3D-printed case. This device can now be connected to 12V and two segments of LED tape that can then be controlled trough Wifi. The ESP8266 module goes on the pin header on the left and was removed for this picture. After the multichannel LED driver was completed, I was just getting used to controlling LEDs at 14-bit resolution. I liked the board we designed in this project, but at 32 channels it was a bit large for most use cases.
@@ -114,7 +114,7 @@ Your browser does not support the HTML5 video tag. A demonstration of the comple
</div>
</div>
- <div class="card"><h2><a href="/blog/led-characterization/">LED Characterization</a></h2><strong>2018-05-02</strong>
+ <div class="card"><h3><a href="/blog/led-characterization/">LED Characterization</a></h3><strong>2018-05-02</strong>
<div class="summary">
Preface Recently, I have been working on a small driver for ambient lighting using 12V LED strips like you can get inexpensively from China. I wanted to be able to just throw one of these somewhere, stick down some LED tape, hook it up to a small transformer and be able to control it through Wifi. When I was writing the firmware, I noticed that when fading between different colors, the colors look all wrong!