Posts

Showing posts from September, 2018

How does it make a VPN with 2 piece of Raspberry Pi, between here and some strong protective country ?

How does it make a VPN with 2 piece of Raspberry Pi, between here and some strong protective country ? the Answers Tho**  you set up a vpn server on one of them and a vpn client on the other.. and then you connect the client to the server... Dani** You can sometimes set up a VPN server on a router. Might be easier Eri** Drill through giant firewall. Maybe tunnel...   Dan** Always one ... Jod*** Just know that the traffic will glow bright green on a SIEM, identifying it as likely VPN traffic.  => Tho**    didnt they just introduce "personal scores" in china?!.. i think by even asking this question he lost some points...    https://www.businessinsider.de/china-social-credit-system...    Tho** 1984.. big brother is watching...             but hey.. at leat everybody knows whats going on.. not like in the rest of the world where the same shit happens by banks, insurancesm, credid companies in the dark...    Wins** Wow, that's absolutely insane... :o jus

Recognizing faces with AI program and RPI

Image
Is there a program that uses AI to recognize faces with RPI? If it is possible, I would like to utilize raspberry pie to operate face recognition using artificial intelligence databases. One would be used for face recognition, and the another will be used for extracting contact information, personal information, and business cards associated with the person recognized. Will it be possible to turn this into reality? To provide a real-world example, this idea could be used by medical service camps that provide medical treatment and medication in developing countries. The problem arises when dealing with revisiting patients because medical and diagnostic logs are difficult to manage due to lack of information about them. The reason for this issue is because during most of the time, there are too many patients with names that are challenging to pronounce and record in English, which makes it difficult to keep a decent log. This idea could also be used for managing customers in cafe an

Is it possible to make high-performance cipher or decipher in Arduino?

Image
Is it possible to make high-performance cipher or decipher in Arduino? We know that Arduino is a powerful device, but we also know that we can’t perform asymmetric key encryption and decryption such as ECC or RSA. This is because for RSA, 2048 bits must be available to perform an exponential computation of 2 ^ 2048. For ECC, which is an elliptic curve cryptography, it requires Y ^ 2 = X ^ 3 + A * X ^ 3 + B * X + C operations to perform at least 2 ^ 256 exponential operations hundreds of times per second. Both operations can’t be done with a normal CPU.  In addition, after exchanging keys with asymmetric keys, you must encrypt or decrypt with AES and authenticate with a hash function such as SHA. This is not a general algorithm, so the CPU must have a dedicated security co-processor. In general, MCUs aren’t as costly, but once these high-performance coprocessors are integrated, they become difficult to sell because their size and price will incre

Join the DIY Bitcoin hardware wallet.

Image
Join the DIY Bitcoin hardware wallet project DIY: Do It Yourself We are currently developing a DIY hardware Bitcoin wallet.  In terms of financial problems, it is quite useless because this module is more costly than other modules available in the market. However, it is my belief that useless and unnecessary activities can open doors to new culture and interesting stories in this world. Because I have created the hardware wallet myself, it is more difficult to hack than other hardware wallets in stock. In the security industry, it is foolish to say that a certain  module is impossible to hack, therefore I will not use the word impossible because I am not stupid. Security devices available today have defense mechanism only defined within a threat model. The definition of threat model can be found at: https://en.wikipedia.org/wiki/Threat_model . In an external environment, threat model doesn't provide complete security due to its vulnerability. Pe

Implementing a small-scale broadcast project using Raspberry Pi 3 b + using NEOWINE technology

Image
NEOWINE is currently implementing a small-scale broadcast project using Raspberry Pi 3 b +. The project starts with a video signal taken by an RPI camera which is sent to a monitor via HDMI port. The same video signal is also compressed to H.264, and the file is sent to a PC and displayed on its screen. Ultimately, the H.264 signal is compressed and encoded by our chip,  DORCA3RIM, using RPI in realtime and is decoded by a different RPI using the same chip. The source code of this project could be found and cloned at NEOWINE GitHub. For the more secure world, NEOWINE.

Seeking software developers

Image
Calling all software developers.  I am looking for software developers to work with us at NEOWINE. We have recently developed a security module called DORCA3NFC. This module has USB and NFC interface for interaction with PC and mobile phone. This module is capable of performing ECC, RSA, Key Generation, AES, SHA, PUF, and TRNG operations. This security module is coded in Native C and because it doesn't have an operating system, it is difficult to hack. In addition, thanks to the direct interaction between the module and the user made possible by its 128x64 dot OLED Window and three buttons, hacking is made even more difficult. This security module can be used for virtual money transaction and collection as a virtual hardware wallet for cryptocurrency such as Bitcoin and Ethereum. Compared to the already existing software, it can be used for an even more secure communication and security.  The Hardware and Firmware parts are almost complete with its their functions alre

Cold Wallet Development

Image
Is it possible to code the Cold Wallet project? Currently, I am working on a DIY cold wallet. The advantage of a Cold Wallet would be that hacking won’t be so easy. As we have seen in the cases of Bitcoin, Ethereum and etc, hacking is one of the biggest problems when it comes to online currency. Therefore, using an open source, I am wanting to make a Cold Wallet. I am planning to use the Raspberry Pi and USB to interface the Cold Wallet. Using an OLED 128x64 dot window, the wallet will display all the necessary details when it comes to sending and receiving money such as name, bank account number, amount of money, and more. By click of a button at the bottom, the user will be able to check the status of any financial exchange.  The hardware will be comprised of ECC sec256 and p256 SHA256, which will process in real-time, therefore the only method of hacking the bank account or the transaction would be physical robbery. So far, all the hacking crimes co

Raspberry Pie's private broadcast system open source platform with hardware DRM

Image
Raspberry Pi’s private broadcasting system open source platform with hardware DRM I would like to hear your professional opinion. Will this small hardware DRM system be able to handle the size of a video broadcasting system? There are many methods of broadcasting media such as STB, cable, internet, etc. However, such available system is simply too expensive. I think it is possible to make broadcasting easier and cheaper by changing the concept like the figure below. I’m unsure whether or not changes in design will be needed for internet broadcast. My idea is to make a concept design by incorporating private video stream and DRM video device. * DRM Digital Right Management    https://en.wikipedia.org/wiki/Digital_rights_management Is it a valid idea to operate such a small private broadcasting system with DRM? Normally, commercial broadcasting system requires at least 10 Billion USD, but with this model, the price could be cut significantly to just 10,000 U

Raspbian Home or Office cloud storage, could not hacking possible for hardware chip security module

Image
Raspbian Project: Cloud storage devices used in homes and offices that are hack-free with the help of hardware security module chip. I would like to hear your opinion to investigate the security needs of our semiconductor customers. Is this product worth purchasing as a developer or a user? If you were to assume that this product works as shown in the figure below, would you be willing to purchase this hardware security module separately? Although I have a lot of experience in designing secure semiconductors, I’m not very familiar with Raspberry Pie. Therefore, I am asking you whether you believe that this project is valid or not. The reasons why I think this project is needed 1.      You can increase your cloud storage from 1TB to unlimited data storage with no monthly fee. 2.      You will have your own cloud storage and services. 3.      Security problems are easier to manage with semiconductor hardware modules with unique PUF, ECC, ECDH, AES, SHA, TR