One of the community projects which uses wolfSSL is the Gargoyle Router. If you haven`t heard about the Gargoyle Router, it is an interface for small, widely available routers such as the Linksys WRT54G series or the Fonera. Adding additional functionality to the normal router firmware, it is based on the kamikaze release of the […]
Read MoreMore TagAuthor: wolfSSL
Kaizen: Continuous Small Improvements Will Yield Large Compound Improvement Over Time
We’re a fan of Ivan Ristic, and suggest you follow his blog at http://blog.ivanristic.com/. We enjoy his work and appreciate his occasional constructive criticism of our work. One of his recent presentations caught our eye. It’s motivating and packed with ideas regarding SSL. Check it out here: http://blog.ivanristic.com/2010/11/stop-complaining-and-solve-a-security-problem-instead.html. We like the title: Stop Complaining and Solve […]
Read MoreMore TagEE Times Picks Top Ten Technologies to Watch in 2011
See their picks here: https://www.eetimes.com/document.asp?doc_id=1258133. We’re keenly interested in Augmented Reality and Automotive Radar for personal reasons. It’s just good and useful stuff that will make our lives better. For business reasons, we’re closely following Personal Power Management, which allows you to see your power consumption in timely (not real timely), but actionable increments. For those […]
Read MoreMore TagResearch Predictions on the Adoption of Smart Appliances
See here http://www.embeddedinternetdesign.com/showArticle.jhtml?articleID=228800856 (as of 26 March 2018 at 9:24am MDT, this link no longer works and has no alternative) for the latest research on the growth and adoption of smart appliances from IMS research.
Read MoreMore TagVDC’s Predictions for the Embedded Market in 2011
2011 looks to be another interesting year in the embedded systems marketplace according to VDC’s predictions outlined here: https://www.eetimes.com/author.asp?section_id=36&doc_id=1265937. If you’ve been reading our commentary, then you know that we think they’re right on with item 5: OEMs to increase use of web security test tools. This just makes a world of sense given the high […]
Read MoreMore TagDesign Consulting for Building SSL Security into Devices
You may have recently read our blog post regarding Exposed Private Keys and how you may create secure private keys for SSL-enabled devices using wolfSSL. If your application or framework needs to be secured with SSL/TLS but you are uncertain about how the optimal design of a secured system would be structured, we can help! […]
Read MoreMore TagHoliday wolfSSL Release 1.8.0
So what made it into the wolfSSL Holiday Release? We think a few items that users will appreciate. Some concern increased portability through the os_settings.h file and the new C Standard Library Abstraction layer. Others lower memory use through configurable input/output buffer sizes and less dynamic memory use. For the readers out there we now […]
Read MoreMore TagwolfSSL Maturity
We saw a post on a mailing list recently that questioned the maturity of wolfSSL. The post came as a surprise. We think wolfSSL is pretty mature by most standards! Here’s our key points on wolfSSL’s maturity: 1. It is on its 29th release.2. It has been vetted out in the open source community for 6 […]
Read MoreMore TagKeep your SSL Private Keys Private
A recent blog about “Breaking SSL on Embedded Devices” has been making the rounds recently. It`s not an attack on SSL, it`s an attack on weak private key security. Specifically, embedding a private key into firmware allows anyone to extract the key and turns an otherwise secure connection into something nothing more secure than TCP. We […]
Read MoreMore TagWhat is the yaSSL community getting for Christmas?
Will it be a new release with awesome new embedded ssl features? What could those features possibly be? Will it be even faster and smaller? More portable? New ciphers? Do you think you know what the yaSSL community is getting for Christmas this year? Send us your guess to info@yassl.com!
Read MoreMore Tag
