Rubén Rodríguez AbrilSSL/TSL bajo ataque(I): BEASTTLS (Transport Layer Security) y su antecesor SSL (Security Socket Layer) son los protocolos de seguridad más usados en la navegación web…Oct 3, 2020Oct 3, 2020
Rubén Rodríguez AbrilLand Registry in Ethereum (7 of 7): final remarksThe Fourth Industrial Revolution, whose main feature is the intimate conection between cyberspace and ordinary physical space, is…Sep 24, 2020Sep 24, 2020
Rubén Rodríguez AbrilLand Registry in Ethereum (6 of 7): the land parcel’s folioThe “land parcel” is the core concept at the heart of every land publicity system. It can be defined as a “piece of land delimited by a…Sep 24, 2020Sep 24, 2020
Rubén Rodríguez AbrilLand Registry in Ethereum (5 of 7): issue of registry recordsAny person who intends to register the conveyance of a right in rem, or to perform any other type of registry record, must send a…Sep 12, 2020Sep 12, 2020
Rubén Rodríguez AbrilLand Registry in Ethereum (4 of 7): the principles of the algorithmic real estate publicitya) Formal consent and abstractionSep 12, 2020Sep 12, 2020
Rubén Rodríguez AbrilLand Registry in Ethereum (3 of 7): the registration processThe operation of a Land Registry is essentially not very different from that of a blockchain. The transactions of the Registry are called…Sep 12, 2020Sep 12, 2020
Rubén Rodríguez AbrilLand Registry in Ethereum (II): Ethereum’s architectureOriginally, the Bitcoin protocol only allowed the transmission of rights of a fungible nature like cryptocurrencies. Although it allowed…Sep 11, 2020Sep 11, 2020
Rubén Rodríguez AbrilLand Registry in Ethereum (I): the Land Registry and the real estate publicityProperty and other rights in rem are personal rights, valuable in money, which are characterized by two main features: its immediacy and…Sep 11, 2020Sep 11, 2020
Rubén Rodríguez AbrilWiFi bajo ataque (II): Kr00k, un “bug” de la tarjeta de redEn el año 2019, la empresa de seguridad informática ESET descubrió una vulnerabilidad de Capa 2 (Layer 2), que afectaba a más de 1.000…Sep 10, 2020Sep 10, 2020
Rubén Rodríguez AbrilAES bajo ataque (I): KRACK, un ataque de repetición al modo CTREn la presente publicación será descrito KRACK, uno de los ataques más recientes que ha sufrido el protocolo WPA2, ampliamente utilizado…Sep 9, 2020Sep 9, 2020