Tag Archives: VPN

A work protocol for digital work product contract

Digital work product can be intercepted online, and distributed without the permission of either an employer or employee. To limit problems due to intercepted work product, here is an experimental protocol. Prepare an anonymous email account to receive the work. … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

International Digital Encryption Algorithm implementation.

The IDEA cipher was subject to an attack more efficient than brute force, in 2012. Despite this, competent researchers still agree that the attack is not yet computationally feasible. If you’re a little nervous, here’s a way to harden your … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Family VPN gambit – a variation on the “Personal Cloud.”

“Personal Cloud” has been defined by usage as a person’s own slice of the world wide cloud. If a network administrator ran a family VPN on a private basis, he would be able to control the family’s own data and … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Hypothetical Key Logger defeat

This is a hypothetical key-logger defeat. To test the protocol, consider any keylogger to be an intelligent M(an) I(n) the M(iddle.) Ingredients: Proprietary keyboard that can  track and use as many session keys as active secure applications. execute a Diffie-Hellman key … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment