This is what we did to setup a few dashboards at Improbable
Chrome on kiosk mode: http://raspberrypi.stackexchange.com/questions/40631/setting-up-a-kiosk-with-chromium
- Raspberry Pi
- Dashing Service
This is what we did to setup a few dashboards at Improbable
Chrome on kiosk mode: http://raspberrypi.stackexchange.com/questions/40631/setting-up-a-kiosk-with-chromium
This tutorial will walk you through the steps needed to get root
SSH
access on an Engenius EAP600 dual-band WiFi access point. SSH doesn't
come enabled out of the box on these things, so if you want to SSH into the
device (which is running an old version of OpenWRT), keep reading.
See the actual github project here: https://github.com/arngll
Latest specification text: https://github.com/arngll/arngll-spec/blob/main/n6drc-arngll.md
Author: Robert Quattlebaum [email protected]
Date: 2015-08-03
This document describes a mechanism for achieving a significant improvement in the efficiency of merle signatures, allowing public keys that are 5% smaller and signatures that are 37% smaller.
# Creates a degenerate PKCS#7 certificate only in ruby (SCEP application/x-x509-ca-ra-cert) | |
# Inspiration: https://github.com/AppBlade/TestHub/blob/master/app/controllers/scep_controller.rb#L92-L112 | |
# | |
# Tested Ruby 2.2.0 OSX 10.10, OpenSSL 1.0.1l | |
require 'openssl' | |
cert = OpenSSL::X509::Certificate.new File.read('some_cert.crt') | |
# Fails ruby 2.2, OpenSSL 1.0.1l!! | |
p7certs = OpenSSL::PKCS7.new |
-----BEGIN PGP SIGNED MESSAGE----- | |
Hash: SHA256 | |
# Hardware-backed Personal Keys | |
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC4Y/rpKbKEQcBm0dCCHt90s6G945AtEtgG++EQ6v1+fgoQJkVTI2ajg8WDeXVFKxtuOO9QbW0LBHKOX650+9kjgRshF1Z/ystO0h2FSP8ic4PaP79W14qrszIS102vP168IxSLBsTA/X5yivwuLGbxzMEWA4IrAm1s2GRE0ZGWUmIhp7wps9cOhbVsfGXIMLcHAU6mXutfsVtzOjC6tS8NpitcmaMBAsJ2Hy8cyVDApm5vuNLUsPXtTwVNfxRX3d/O0xJ4YRFngTGKVUKb1acX7t0PyXUH0EA/xKy5yfTUoDXvGttz9UTEXsy07qKpVwOT566iDxpl3ie4J+hUaCtB openpgp:3640FDF505046F79 | |
# Hardware-backed Work Keys | |
ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBJemMyZM7uY7rkJ65xWOW+z7mgU5E5MAtz+4MppZf7folk1UqI0Koe9V3bY+GxBgMjg1K9IFVfQSuG3qyFahwJU= [email protected] | |
ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBL/SP/JuW8oZqNRvY1tQYYvDbGy35lJkLu+dt8sRx36zQ7yLZOFfVmh7qIQTxeF0oMZmYTCHtO2z58DmQ6CSWio= [email protected] |
-----BEGIN PGP PUBLIC KEY BLOCK----- | |
mQINBFReyUEBEADEahczwRsXCUXn7rT2obtAL2Novbo26Gdr8t3Fk2x0h6/OiLR0 | |
p408uckZkovb6OoJTXA/SuOXRpkPv8JOucNkabk9o8FZF2ugo9spCF7ez3IZap7Q | |
VDqGodCHbjSp17Nu7lyYquPY/pT8xqKrYtykkDxKt6S0uX9n/qUx2yVX4Id+WrsY | |
rRUaAgYGqS3Q2umf8xDJqOkHJOrw8C10pNn5pl39ccvBV8HrakvQwBVYm2214Mx8 | |
Ull2oFhdGmt4fZFdtAbw2hou0oa9e6l+tun0R874BB4exLii8x9Bgq5HROKvPhJV | |
NdfZmj0h3jT5GGihE5xmzpwWeyiHDZwINWpuQ/WmL8wtVfu+VJRjUR5KKCUt6kfN | |
9dCmwP73puQfFPnZj2azzyGdxiVmHdoNeMu9OHga81yk+RPO2CLgmhwL5BJX8N2z | |
z4z7Qd4dceqlSRSd6D3mGRIfekgs4YHfn0xFnNBlTy6010GkHBgb2rSlXqz5nQNW |
# trace debug-log macro | |
sudo dtrace -qn 'security_debug*:::log { printf("[%s] %s\n", copyinstr(arg0), copyinstr(arg1)); }' | |
# restart securityd | |
sudo launchctl unload /System/Library/LaunchDaemons/com.apple.securityd.plist && | |
sudo launchctl load /System/Library/LaunchDaemons/com.apple.securityd.plist |
// points = number of points (minimum 3) | |
// outer = radius to outer points | |
// inner = radius to inner points | |
module Star(points, outer, inner) { | |
// polar to cartesian: radius/angle to x/y | |
function x(r, a) = r * cos(a); | |
function y(r, a) = r * sin(a); | |
// angular width of each pie slice of the star |
Digital cryptography! This is a subject I've been interested in since taking a class with Prof. Fred Schneider back in college. Articles pop up on Hacker News fairly often that pique my interest and this technique is the result of one of them.
Specifically, this is about Lamport signatures. There are many signature algorithms (ECDSA and RSA are the most commonly used) but Lamport signatures are unique because they are formed using a hash function. Many cryptographers believe that this makes them resistant to attacks made possible by quantum computers.