Built with 💜 using Emacs 26.1 (Org mode 9.1.9)

🔒 SSL Labs Server Scan
SecurityHeaders.io Assessment
VirusTotal Analysis
🤖 Rescan.io Tech Stack Analysis
W3C Markup Validator

Last Published: 2020-06-21 Sun 01:06,
📅 Commit history

Byte Cache


This computing and security blog is intended to:
- serve as documentation for my own reference.
- help others that may be looking for such information.
- gain valuable feedback from the community for my own edification.

Bare-Metal Environment

Because there is no cloud, I choose to document my bare-metal environment. Of course, it includes distributed components, such as Docker containers in Kubernetes workers. Following is a UML diagram describing my environment. Bare-metal configurations are included for components with larger font. Very much a work in progress.

Sorry, your browser does not support SVG.


Rigorous analysis on cryptographic systems typically requires reviewing each primitive in isolation. When assessing these cryptographic primitives, generally the scientific method is as follows:

  • Specify the thread model: What can an attacker do to attack the cryptographic primitive?
  • Propose secure construction for primitive.
  • Prove an attack which compromises the construction under the threat model also solves a difficult underlying problem (e.g., factoring primes from a large product).

Such analysis provides a statistical proof of security.

The following UML describes classes of cryptographic primitives, and provides links to my analyses where there is larger font.

Sorry, your browser does not support SVG.