☕️ Insufficient Coffee

Archive of posts regarding pki

Reflecting on 10 years of Let's Encrypt

Published 2025-12-03

My friend Christophe Brocas has just published a retrospective on the ten years since we unveiled the ACME protocol to the world. He interviewed me and some colleagues for the piece, and I recommend it! [read more]

The State of CRLs Today

Published 2017-08-18

Certificate Revocation Lists (CRLs) are a way for Certificate Authorities to announce to their relying parties (e.g., users validating the certificates) that a Certificate they issued should no longer be trusted. E.g., was revoked.… [read more]

The end of SHA-1 on the Public Web

Published 2017-02-23

Our deprecation plan for the SHA-1 algorithm in the public Web, first announced in 2015, is drawing to a close. Today a team of researchers from CWI Amsterdam and Google revealed the first practical collision for SHA-1, affirming the insecurity of th… [read more]

Service Assisted Communication and Simplifying a PKI

Published 2014-09-09

Because many of the devices in the IoT are headless and have limited ability to interact with their owners, there needs to be a way to authenticate them without passwords, and without the shortcomings of the existing 0000 and 1234 problems in the Blu… [read more]

Public Authentication

Published 2014-07-30

The public authentication problem is one we have all learned to solve with intuition: How do I decide to trust a new person?… [read more]

Prevalence of Well Known Peers in the Internet of Things

Published 2014-07-04

The Internet of Things is imagined to be a interconnection of sensors and physical devices of all kinds into the world’s information systems: a collection of machine-to-machine communication devices used to gather and distribute information about the… [read more]