Displaying 5 results from an estimated 5 matches for "trustedtimestamp".
2013 May 28
0
LocalDiscovery
...en to do the local discovery, 0=once
- LocalDiscoveryAddress=y to what broadcast address to send the
discoveries. like how NTP does this. this is usefull when there's a
router between two segments which doesn't route the broadcastst
e.g. 192.168.2.255
Folkert van Heusden
--
www.TrustedTimestamping.com is a service that enables you to show that
at a certain point in time, you had access to a hash-value reflecting
the contents of a file (this file can be a word document, a jpeg
image, everything).
----------------------------------------------------------------------
Phone: +31-6-41278122,...
2013 Mar 03
2
[Announcement] Tinc version 1.0.20 released
With pleasure we announce the release of tinc version 1.0.20. Here is a
summary of the changes:
* Use /dev/tap0 by default on FreeBSD and NetBSD when using switch mode.
* Minor improvements and clarifications in the documentation.
* Allow tinc to be cross-compiled with Android's NDK.
* The discovered PMTU is now also applied to VLAN tagged traffic.
* The LocalDiscovery option now
2013 Mar 03
2
[Announcement] Tinc version 1.0.20 released
With pleasure we announce the release of tinc version 1.0.20. Here is a
summary of the changes:
* Use /dev/tap0 by default on FreeBSD and NetBSD when using switch mode.
* Minor improvements and clarifications in the documentation.
* Allow tinc to be cross-compiled with Android's NDK.
* The discovered PMTU is now also applied to VLAN tagged traffic.
* The LocalDiscovery option now
2013 Sep 14
4
Elliptic curves in tinc
In the past 24 hours multiple persons have contacted me regarding the use of
elliptic curve cryptography in tinc 1.1 in light of the suspicion that the NSA
might have weakened algorithms and/or elliptic curves published by NIST.
The new protocol in tinc 1.1 (SPTPS) uses ECDH and ECDSA to do session key
exchange and authentication, in such a way that it has the perfect forward
secrecy (PFS)
2013 Sep 14
4
Elliptic curves in tinc
In the past 24 hours multiple persons have contacted me regarding the use of
elliptic curve cryptography in tinc 1.1 in light of the suspicion that the NSA
might have weakened algorithms and/or elliptic curves published by NIST.
The new protocol in tinc 1.1 (SPTPS) uses ECDH and ECDSA to do session key
exchange and authentication, in such a way that it has the perfect forward
secrecy (PFS)