Jump to Navigation

Me on Twitter

  • People who make laws on things they don't understand; just the same all over the world unfortunately - https://t.co/Otc4fkhXi5 6 days 15 hours ago
  • RT @tewoz: Demain, lancement officiel de ma campagne de crowdfunding pour mon recueil de strips « Comme un Lundi » ! Je compte sur vous pou… 6 weeks 5 days ago
  • Found that in my old CD tower. Noticed the penguin ? Yes it's a #Linux version of #Tribes - Still one of the best g… https://t.co/4QEzHVXhmO 9 weeks 53 min ago
  • RT @esascience: In this #Hubble image, a very distant galaxy – nicknamed the Sunburst Arc – appears at least 12 times 10 weeks 2 hours ago
  • The CIA just lost control of its hacking arsenal. Here’s what you need to know. - https://t.co/QrjTDlHJIA 10 weeks 4 days ago
  • RT @timberners_lee: Today the internet is 50 years old. The internet & the web it enabled have changed billions of lives for the better. B… 11 weeks 2 days ago
  • Head-to-head evaluation of six password managers - Quantopian Security - Medium - https://t.co/WAiev023AJ 11 weeks 4 days ago
  • How I Fully Quit Google (And You Can, Too) - Featured Stories - Medium - https://t.co/d61000B5Fz 13 weeks 1 day ago
  • Just curious to see what happens if I publish a proof that's not been validated yet but another one has been since… https://t.co/tEjW1dOBZk 13 weeks 2 days ago
  • Verifying myself: I am nicolabs on https://t.co/kWEo6pR64D. 8Q3_sZQCU_eT7R0adjPpzaxxehzySRwhjnWp / https://t.co/AIAa4UWCyX 13 weeks 2 days ago

cryptography

android A paper backup for your private key

Android keychainAndroid requires developers to sign their applications with a digital certificate and that each future release be signed with the same certificate.

Sadly, bad things happen when the developer (you) looses access to the certificate : he (you) will not be able to release updates for the application without it. NeverEver.

Android does not currently support multiple certificates per application so the best you could do would be to release a new app with the same name, in the hope your users will find a way to it by themselves.

As years go on, you will change your computer, wipe USB keys, reinstall OS, ...
So many dangerous operations for your digital certificates, hidden among millions of files !
If, like me, you are anxious at the idea of losing your certificates or passwords, just print a paper copy !
Although it is not invulnerable, paper should be less prone to mass erasing than a simple electronic file.

The idea is simplenot new, and you just need to know two commands to get a printable hard copy of your certificate.

Let's start.

java HttpClient 3.x : a portable SSL Socket Factory implementation

I was just trying to implement client and server authentication over SSL on IBM Websphere 6 (JRE 1.4.2)...

[...]

It may sound awkward in 2012, but if you wish the HTTPS server to identify your Java client (versus : only the server is identified), you will have to write your own implementation of a socket factory.

The Java Runtime Environment doesn't provide ready-to-use classes to do this. Yes : there is javax.net.ssl.SSLSocketFactory.getDefault() but it requires to set some system (therefore global) properties to point to the certificates files !!!

Even with Apache's HttpClient (at least version 3.x), you have to use a custom SSLProtocolSocketFactory.

The HttpClient SSL Guide provides sample code to implement mutual client and server authentication ; unfortunately the latest stable release of it (contrib 3.1) is bound to Sun's API with imports such as com.sun.net.ssl.KeyManagerFactory. Needless to say that this will not work on an IBM Websphere JRE...

This article contains an implementation of a SSLProtocolSocketFactory for HttpClient, to whom may be interested...

Syndicate content