Posts

Showing posts from October, 2018

D3R Open Hacking Contest

Image
D3R Open Hacking Contest What is D3R? What can you do with it? D3R is a type of Security Element HAT for Raspberry Pi. Raspberry Pi has the most abundant software platform with its currently 50,781 open source code projects on Github only, and many more to come. However, there's no countermeasures for security issues because it is meant for educational purposes. As an example and solution for one of the issues regarding security, we implemented DRM using the HAT called D3R in Raspberry Pi. Raspberry Pi is open with Hardware and Software therefore DRM/CAS configuration is difficult. This means that you cannot use platforms such as pay-in-receiving or paid-in games. There are so many useful things you can enjoy with little amounts of money. Without such platforms, you can't get advertising revenue from games or sell valuable software. But if you can't hack into this DRM, it's now possible. D3R creates an incredible level of security barriers for Raspberry Pi.

Do you need an IoT M2M platform? So what are you going to do about your security and costs? We have a platform for IoT security and education.

Image
Do you need an IoT M2M platform? If so what are you going to do about security and expenses? We at Neowine provide a platform for IoT security and education. In order to participate in the program, you must first purchace D3R.  Some projects are being implemented as we speak, and if you are an expert in the field, you are more than welcome to participate. So far, we have been successful in controlling Raspberry Pi's LED and sensor I/O via mobile phones, and if possible, I would like to do the rest with you if you're a willing expert. You can participate in the project by purchasing the D3R kit from eBay. https://www.ebay.com/itm/372464318171 Please refer to the following link Github link:  https://github.com/neowine/iot_dev_project.git If you are a beginner in the field yet are still interested in joining one of our projects, we have other options for you. The project that you are currently looking at is meant for making business, therefor

Will the business be possible with Raspberry Pi? Cloning and Security Issues: NeoWine D3R

Image
Will business be possible with Raspberry Pi? Cloning and Security Issues: NeoWine D3R Is it possible for you to make money from a DORCA3RIM license if you use Raspberry Pi to develop open source software for commercial use? DORCA3RIM is a semiconductor module that has software replication prevention and security functions. DORCA3RIM is used to interface the DORCA3 of NeoWine with Raspberry Pi. If you've had enough software training with RPi, how would it be possible to make money with the knowledge you have? Let's find out if business is possible through software replication prevention and security function chips.  DORCA3RIM: DORCA3 Raspberry Pi Interface Module 01. Software Replication Prevention Chip - Software Copy Protection Function Software replication chips have the ability to prevent unauthorized copying of applications with system firmware. For example, the hardware dongle used in computers prevents unauthorized copying of PC programs, but system replic

How PKI Works ?

Image
ACTIVE DIRECTORY How PKI Works ? MAY 13, 2018  BY DISHAN M. FRANCIS 1 COMMENT I added a picture of color just for the sake of understanding. The original article can be followed by a link. When I talk to customers, engineers, most of them know SSL is “more secure” and works with TCP 443. But most of them do not really know what is a certificate and how this encryption and decryption works. It is very important to know how it’s exactly works then the deployment and management becomes easy. Most of the PKI related issues I have worked on are related to misunderstanding on core technologies, components and concepts related to it, rather than service level issues.  Symmetric-key vs Asymmetric-key There are two type of cryptographic methods use to encrypt the data in computer world. Symmetric method works exactly the same way your door lock works. You have one key to lock or open the door. This is also called as shared secret and private key. VPN connections, Backup Sof

What happens if a secret key is leaked from Intel CPU? You can't stop it. Which is the most powerful security?

Image
What happens if a secret key is leaked from Intel CPU? You can't stop it. What is the most powerful security option? You believe that you are probably safe enough because you use the security of a large company. But there is no security in the world that is strong enough, and it is very dangerous to believe that your privacy and security are dependable because they are published in certain standards, NDA, protocols, papers and policies. People who develop these security issues generally think that "wouldn't it be everybody's problem if it happened"? Everyone's problem are not my responsibility,  so they take it boldly. It is not my responsibility if others have also adopted this security system. As we know, it's not my fault if the security system that everyone adopts has a problem. When there is a problem, they say, "I'm very sorry." But that's the end of them. Regretful expressions are theirs and it is us who are damaged.

How can you make money if you have a genius for software coding?

Image
How can you make money if you have a genius for software coding? The recent leakage of personal privacy and hacking of security has become serious. As the Internet evolves, it is possible that individuals' card numbers, bank accounts, e-mail accounts, Internet accounts and ID codes will be hacked in large quantities at high speed. Also, if important personnel identification, source code, account, quotation price, and critical company information are leaked outside, a serious problem could arise. We don't have a way to solve the overall security problem right now, but Neowine is developing a secure semiconductor product. Today, we can think about using the Neowine semiconductor for security in a variety of areas, including replication protection and information security. So far, security has been centrally controlled by large companies and governments. This is expensive, and individuals are forced to rely on large companies and governments to deal with all their security is

NeoWine has implemented a secure IoT system using Mobius, an open source based IoT platform.

Image
NeoWine has implemented a secure IoT system using Mobius, an open source based IoT platform. The Mobius IoT Platform is on Github. It is an open source system based on OM2M. https://github.com/IoTKETI/Mobius We have fixed some errors in the open software and implemented the demo system. In recent years, California has changed its law so that it can only sell if IoT is equipped with the right security. Related Links https://www.cnet.com/…/california-governor-signs-countrys-…/ ... Brown signed the bill, SB 327, on Friday. The law mandates that an Internet-connected, or "smart," device ensures the gadget has "reasonable" security features that "protect the device and any information contained therein from unauthorized access, destruction, use, modification, or disclosure. " ... NeoWine is using the related Mobius IoT Platform and Edge device and related Android App using DORCA3RIM. . If you purchase DORCA3RIM after NDA, you can downlo