Tags


News [2]

DarkMatter and industrial IoT security

Article Blog Image

On Monday, Bleeping Computer published an article about the disturbing revelation that Dark Matter, a cybersecurity firm based in the United Arab Emirates, has aspirations to become a trusted root certificate authority in one of the world’s most popular web browsers.

Breaking new ground in IoT

Article Blog Image

After months of incubation we’re excited to start talking about our new, we believe groundbreaking, initiative: Diode™. Incubating within Exosite, we’ve been working hard to fix some of the fundamental shortcomings of PKI that are underlying 99% of all Internet communication today.

Blockchain [1]

Breaking new ground in IoT

Article Blog Image

After months of incubation we’re excited to start talking about our new, we believe groundbreaking, initiative: Diode™. Incubating within Exosite, we’ve been working hard to fix some of the fundamental shortcomings of PKI that are underlying 99% of all Internet communication today.

Burning Platform [3]

Why there are 3652 organizations that can read everyone's encrypted traffic

Article Blog Image

You may not be aware of this but if you are browsing the web, running IoT devices in your business or at your home, you are being protected by a 30-year-old security infrastructure. In this post, we will uncover the history of the internet PKI that holds most of the internet together today and highlight some of the most obvious threats and known flaws. This article is the first in a series investigating the current state of PKI and the events leading up to the first Diode concept.

Decentralized PKI in a nutshell

Article Blog Image

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your certificate all have to agree on the same data to create this security.

DarkMatter and industrial IoT security

Article Blog Image

On Monday, Bleeping Computer published an article about the disturbing revelation that Dark Matter, a cybersecurity firm based in the United Arab Emirates, has aspirations to become a trusted root certificate authority in one of the world’s most popular web browsers.

PKI [4]

Why there are 3652 organizations that can read everyone's encrypted traffic

Article Blog Image

You may not be aware of this but if you are browsing the web, running IoT devices in your business or at your home, you are being protected by a 30-year-old security infrastructure. In this post, we will uncover the history of the internet PKI that holds most of the internet together today and highlight some of the most obvious threats and known flaws. This article is the first in a series investigating the current state of PKI and the events leading up to the first Diode concept.

Decentralized PKI in a nutshell

Article Blog Image

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your certificate all have to agree on the same data to create this security.

DarkMatter and industrial IoT security

Article Blog Image

On Monday, Bleeping Computer published an article about the disturbing revelation that Dark Matter, a cybersecurity firm based in the United Arab Emirates, has aspirations to become a trusted root certificate authority in one of the world’s most popular web browsers.

Industrial IoT [2]

DarkMatter and industrial IoT security

Article Blog Image

On Monday, Bleeping Computer published an article about the disturbing revelation that Dark Matter, a cybersecurity firm based in the United Arab Emirates, has aspirations to become a trusted root certificate authority in one of the world’s most popular web browsers.

Distributed Infrastructure [1]

Development [1]

Decentralized PKI in a nutshell

Article Blog Image

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your certificate all have to agree on the same data to create this security.

Security [2]

Why there are 3652 organizations that can read everyone's encrypted traffic

Article Blog Image

You may not be aware of this but if you are browsing the web, running IoT devices in your business or at your home, you are being protected by a 30-year-old security infrastructure. In this post, we will uncover the history of the internet PKI that holds most of the internet together today and highlight some of the most obvious threats and known flaws. This article is the first in a series investigating the current state of PKI and the events leading up to the first Diode concept.

Decentralized PKI in a nutshell

Article Blog Image

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your certificate all have to agree on the same data to create this security.