Avatar Profile Image

Dominic Letz

Chief Technology Officer

Dominic has more than ten years expertise in managing large scale M2M and IoT deployments both at Exosite and before at Nokia. His goal is now to bring the security of smart device communication to the next level.

Self-Custody for Data: How to keep your Data safe

Diode Drive

Self-Custody is a term coined by the Bitcoin movement and long-held as the future of finance. It’s the ability to keep your account independent of a Bank, yet still more secure than ever before. When in 2015 the ATMs in Athens stopped giving out cash to their citizens a shock went through Europe making it clear to everyone what a custodian bank account can mean.

Why you should care about Self-Custody for data...

Fixing Camera Freezes on the Raspberry Pi PiCam Module

Raspberry Pi

Keeping your Raspberry Pi Video project up and running 24/7 can be quite a task. With the Diode Client you have always access from everywhere and can easily share it’s video stream. In our previous Raspberry Pi post we focused on the built-in watchdog to keep survive hardware errors. But what do you do if the video fails on you?

There are different tools you can use to capture pictures from your Raspberry...

Running forever with the Raspberry Pi Hardware Watchdog

Raspberry Pi

At Diode we have deployed a couple of long-running Raspberry Pis equipped with cameras and sensors reporting into our network 24/7. All these are under uptime monitoring for us to keep track of the network availability. Every time there is a software problem we want to know it. For that we’re using some external and internal tools.

Eventually we have run into a problem not related to...

June 2020 Update

Diode

Since our last development update in February we’re now just getting over the extended periods of Covid forced home-office. While our Taiwan office was only little affected by Covid19 and has had business as usual since quite a time. In our German office we’re just returning now to a somewhat normal. Hope you guys are all well - keep safe. That said, let’s have a look at the development we got done in...

New Edge Protocol In The Testnet

Development

With the next major client update the Diode network will be using a new Edge Network Protocol. Edge2 is replacing the current Edge1 protocol. Nodes will be supporting both protocols for some time until all clients are being upgraded. The new protocol brings major enhancements. First and foremost the protocol change enables full async messaging and will remove those pesky timeout issues. In addition the change from JSON to RLP for protocol encoding is...

Kazakhstan Mitm Can Be Prevented With Decentralized Pki

Burning Platform

OMG! So it happens again. PKI the Public Key Infrastructure is a centrally rooted security infrastructure to encrypt nearly all of todays internet traffic. And is being used to crack all traffic in Kazakhstan.

Yesterday on the 18h of July 2019, the state-owned telecommunications organization of Kazakhstan started to misuse this central infrastructure in the states initiative against free speech. The now dictatorship of Kazakhstan is forcing its users to install a custom Kazakhstan root...

Hardware Requirements Of Blockchain Clients

IoT

You just decided to start your next project using blockchain. That is awesome congrats! But now you face the many choices: Which blockchain platform and clients are technically suited for your use case?

Makers and IoT specialists know that when designing embedded systems it’s important to understand the technical parameters within which each component can work. The same is true when selecting the blockchain technology. Required storage capacity on the device, RAM usage, and bandwidth...

Blockquick Super Light Blockchain Client For Trustless Time

Burning Platform

- Click here if you just want to read the Paper -

In the last two posts of this series, we first introduced the governance issues in PKI and then the circular dependency between establishing trust in PKI certificates and establishing the current time on a connected device.

So let’s break that circular dependency between time and trust. The difference between trusting a person/an entity and trusting data is key here. How...

From Software Defined Networking to Blockchain Defined Networking

Distributed Infrastructure

Software Defined Networking (SDN) and Network virtualization have been the disruptor technologies that were fundamental to the success of Infrastructure as a Service (IaaS) providers such as Amazon AWS, Google Cloud Compute, and Azure during the last decade. Before that, there were plenty of rival cloud providers - for most of them, changing network configurations, adding/removing machines to a network required human interaction and would take hours or sometimes days. Dedicated networking, networking...

Why We Can't Trust Network Time

Burning Platform

“If you knew Time as well as I do,” said the Hatter, “ you wouldn’t talk about wasting it. It’s him.”
“ I don’t know what you mean,” said Alice.
“ Of course you don’t !” the Hatter said, tossing his head contemptuously. “ I dare say you never even spoke to Time ! Alice in Wonderland

In order to trust a time source, we need to validate its...

Why there are 3652 organizations that can read everyone's encrypted traffic

Burning Platform

You may not be aware of this but if you are browsing the web or running IoT devices in your business or at your home, you are being protected by a 30-year-old security infrastructure. In this post, we will uncover the history of the internet PKI that holds most of the internet together today and highlight some of the most obvious threats and known flaws. This article is the first in a series investigating the...

Decentralized PKI in a nutshell

Burning Platform

In Today’s internet, the authenticity of content is secured by the internet PKI system and the domain name registries. To make it all work first the domain name server (DNS), second you - holding the certificate and the corresponding private key and third a certificate authority which signed your certificate all have to agree on the same data to create this security.

A single miss like a domain name server pointing to a different server...