Creating Challenge Briefs

Jan 9, 2015

Why create a challenge brief? Useful challenge briefs are the key to producing robust solutions for a hackathons. They do this by limiting, not expanding, the parameters of solutions to challenges. It’s easy for participants to overextend themselves on solutions that try to address too many components of a problem at once. By creating challenge […]

Encrypting Communications

Encrypting Communications

Jan 7, 2014

Being in Berlin reminded me that I haven’t been around the hackers I know and love since my last round of gadget aquirement. A lot of conversations have been happening recently around the usability of crypto-aware tools (including an event in DC on Jan 11th that GWOB is doing with OpenITP – you should go!). What we […]

Specing out Challenges

Oct 15, 2012

Hackathons are a great way to move a project forward with new minds on the challenge and a big push over a few days, but it takes some skill to get what you need out of that push. The first step to getting the solutions you need is to make sure that your challenges are […]

How to bootstrap your own SSL infrastructure

Aug 3, 2012

SSL is a layer to provide encryption for data streams, mostly on the Internet. Although there is a whole economy around certificates, you can roll out your own. This guide is intended for people who want to deploy their own infrastructure independently from commercial providers and have experience running their own services or the ones who want to play with […]

Keeping the Channels Open

Jul 14, 2012

This post is based on a talk given at the Datenspuren 2011. The talk provided ideas for network planning people, people developing services as well as users of network based services. General Considerations There are several reasons for a breakdown communication (networks). These can be technical problems (e.g. human errors, mass events), catastrophes (e.g. floods), […]

About Tor

Feb 19, 2012

Tor is a worldwide network of proxies run by volunteers. They donate a chunk of their bandwidth to disguise the origin of others. How it works Tor establishes random encrypted tunnels between nodes in the network. The connections themselves are mixed to obfuscate the relation between incoming and outgoing ones. This way a passive observer only sees connections going […]