Tutorials

Sailfish OS - Jolla C2: Second impressions

I am writing this blog post after trying a newly bought C2 Jolla phone with Sailfish OS installed. I am using the phone for less than a month now with no previous experience on SailfishOS, but with experience of Android and iOS. Read more.

Sailfish OS - Jolla C2: First impressions

I am writing this blog post after trying a newly bought C2 Jolla phone with Sailfish OS installed. The post will review the hardware and the software user experience. I am using the phone for half a week now with no previous experience on SailfishOS, but with experience of Android and iOS. Read more.

Estonian E-Residency and its Compatibility with the eIDAS Program

Estonia provides a so-called "e-residency" to a vast majority of the worlds population. It enables you to use some Estonian services, most notably creating an Estonian banking account and starting an Estonian company. Since Estonia is inside the European Union, this might be interesting for a lot of people.

To authenticate the users, Estonia issues the users a smart card with a personal pin. As advertised, this card could be used to authenticate online and sign and verify documents. But let's see what is possible with it in general. Read more.

Identification vs. Authentication vs. Authorisation

Identification, Authentification, and Authorisation are three completely different things, that should be done in exactly this order. I will explain the differences now and try to illuminate them via a personal passage clearance and via an online login procedure.

Identification is the process of telling someone/thing who you are. This is merely a statement without a prove. It is equal to stating your name and/or entering your username into a login form. Identification is always done by the requester.

Authentification is the process of verifying the identity of someone/thing. Authentification could be done without the identitification step before, but identifying before authenticating reduces the risk of false authentification a lot. During an authentification the requester tells the guard a secret or response to a challenge which the guard is able to verify and link to a specific entity. For the example: The requester shows the ID to the guard, and a password/secret is entered to a login form. As you may see, only entering a password may work, but it may be, that a wrong person gets logging in due to the same password used. Identifying before authentice reduces this risk.

Authorisation is the process of allowing someone/thing to access/enter/do specific things. To authorise, an authentication must have taken place! Authentication is always only done by the guard. Example: The guard checks if the authenticated person is allowed to enter that building, and/or the program checks if the logged in user is allowed to change these userdetails.

Offline Ping

Have you always wanted to carry out an offline ping? Have you ever wondered how long the mail really takes to arrive? Carry out a ping! Send a letter to me with a message and a stamp for return postage, and I'll send you a reply as soon as it arrives!

For the procedure: Send me a letter or postcard with at least your time stamp, your return address and a stamp for the return postage. As soon as it arrives, I will immediately stamp it with my time stamp and send it back.

See also: Offline-Ping