GeistHaus
log in · sign up
45 pages link to this URL
Introducing CFSSL - CloudFlare's PKI toolkit

Today we’re proud to introduce CFSSL—our open source toolkit for everything TLS/SSL. CFSSL is used internally by CloudFlare for bundling TLS/SSL certificates chains, and for our internal Certificate Authority infrastructure.

0 inbound links article en TLSCFSSLEncryptionProduct NewsSecuritySSLCryptography
Cert Decoder - Decode X.509 Certificates Online (PEM)

Free online tool to decode X.509 certificates (PEM format). Instantly view details like issuer, subject, validity, SAN, and more. Secure decoding happens in your browser.

0 inbound links website en Cert DecoderOnline Cert DecoderCertificate DecoderDecode X.509 CertificateDecode X.509X.509 Certificate ViewerPEM Certificate DecoderDecode PEMSSL/TLS DecoderCertificate CheckerDecode SSLFree Certificate ToolSSL/TLS Certificate AnalysisOnline Certificate ParserASN.1 DecoderDER DecoderX.509 Structure
Faster Horses, Better Software

A community dedicated to discussing the big picture: humans, technology, and the connections between them, with an eye towards avoiding techno-dystopian outcomes.

2 inbound links article en
Counter-Strike code leaked: should you worry? What if your code leaks? Learn how to deliver software securely. | Henrique Vicente

In this blog post I talk about what it takes to delivery software securely to the general public. Some gamers are worried the leaked CS source code might mean their machines are unprotected. Their concerns are valid, but this shouldn't be something they should worry about if developers do their work right... and I believe Valve is probably doing it right, so no need to panic.

0 inbound links article en
mobile security series part 4: network security

This post is the fourth in a series on mobile security where we are exploring the Android platform, how security is approached in a mobile context, and what that means for future mobile platforms like …

0 inbound links article en posts android
Manage PKI using OpenSSL - blog.dornea.nu

For better display results you can also have a look at the Manage a PKI using OpenSSL. In the previous X.509 related post I’ve had a look at the internals of a X.509 certficate. This time I want to setup my own PKI using some open source software. This post is a preparation for setting up a VPN using OpenVPN. Before implementing the PKI let’s have a look what a PKI should definitely include (make sure you have a look at the Wikipedia entry):

0 inbound links article en
Hartley Brody

Hartley writes about full stack software engineering and AI-driven software development.

Demystifying Kubernetes RBAC and OIDC Auth

Kubernetes RBAC configuration can seem like a daunting task at first. In this article we will try to demystify some of the mechanism behind the authorisation process in Kubernetes and learn how to generate our own credentials to communicate with the Kubernetes API server.

0 inbound links article en Articles k8skuberneteshomelabrbacservice accountrolerole bindingcluster rolecluster role bindingauthauthenticationoidcauthelia
Wildcard Certificates with Traefik

In this article we’ll explore how to use Traefik in Kubernetes combined with Cert-manager as an ACME (Automatic Certificate Management Environment) client to issue certificates through Let’s Encrypt.

0 inbound links article en Articles kubernetestraefikcloudflarecert-managerlets encrypthttpstlsacmenetworking
C2PA

An open technical standard providing publishers, creators, and consumers the ability to trace the origin of different types of media. At East Sweden Innovation Day 2022, when Mathias Cederholm spoke,...

0 inbound links article en caic2paaideepfakemedia