Rust support is coming to wolfSSL this year! The wolfSSL embedded TLS library is a lightweight, portable, C-language-based SSL/TLS library known for its low footprint, speed, and feature set. Users have been able to take advantage of our library not only in C but also in their Java, C#, Python, and JavaScript projects using the […]
Read MoreMore TagCategory: Uncategorized
Live Webinar: Medical Device Security: Key Strategies for Cybersecurity and Data Protection
You are invited to join a webinar on “Medical Device Security: Key Strategies for Cybersecurity and Data Protection” scheduled for January 25th at 10 am PT. wolfSSL’s Senior Software Engineer, Eric, will delve into the topic of medical device security. As the complexity and connectivity of medical devices have increased, it is essential to maintain […]
Read MoreMore TagThe Quantum Arena
It is always very interesting to see news articles about technical advances in the Quantum Arena. For example: https://www.scmp.com/news/china/science/article/3246752/china-and-russia-test-hack-proof-quantum-communication-link-brics-countries This article talks about cooperation between China and Russia to make QKD (Quantum Key Distribution) between the two countries a reality. While only an experiment, this is a landmark achievement for the BRICS group of countries. […]
Read MoreMore TagX.509 Alternative Public Key and Signature
For people who work in the world of PKI (Public Key Infrastructure) and security protocols, when you think of certificates, RFC 5280 instantly comes to mind. However, it is interesting to note that this document was written in 2008 and is the IETF’s specification of X.509 which is itself a standard that is maintained by […]
Read MoreMore TagwolfSSL Support for the Espressif ESP-IDF v5.2 Beta
Recently Espressif announced their ESP-IDF v5.2 Beta 1 on GitHub. The same day we found out about this exciting new version, we confirmed that all the wolfSSL Espressif ESP32 Examples are working in that environment. So far the “beta” looks to be well polished from our perspective. Last week, we learned about the ESP-IDF v5.2 […]
Read MoreMore TagwolfSSH – Now Available as an Espressif Managed Component Includes SSH Echo Server Example
Not long ago, we announced preview support for new Espressif Managed Components. This is in addition to the core wolfssl managed component. Today you can add SSH capabilities to your toolbox by visiting this link: https://components.espressif.com/components/wolfssl/wolfssh If the ESP Registry page does not fully load with all the text, try holding down the “ctrl” key […]
Read MoreMore TagLive Webinar: Getting Started with wolfSSH in 2024
Join us for a webinar on ‘Getting Started with wolfSSH‘ scheduled for January 18th at 10 am PT. The latest release, wolfSSH v1.4.15, has just been unveiled as part of our Christmas releases! Packed with numerous features and improvements, this version promises an enriching experience. wolfSSL Software Developer, Jacob Barthelmeh, will be your guide, starting […]
Read MoreMore TagwolfMQTT – Now Available as an Espressif Managed Component Includes AWS IoT MQTT Example
Not long ago, we announced preview support for new Espressif Managed Components in addition to the core wolfssl managed component. Today you can add MQTT capabilities to your toolbox by visiting this link: https://components.espressif.com/components/wolfssl/wolfmqtt If the ESP Registry page does not fully load with all the text, try holding down the “ctrl” key when pressing […]
Read MoreMore TagEverything cURL: Your Comprehensive Guide
Get ready to delve into the latest edition of Everything cURL. Daniel Stenberg, the driving force behind cURL, has meticulously crafted the most recent release. In this comprehensive update of Everything cURL, he’ll take you on an exciting journey through the vast landscape of cURL. Discover not just the technical knowledge but also delve into […]
Read MoreMore TagProtecting wolfSSH from Passive SSH Key Compromise
About the Compromise Recently, a team led by Keegan Ryan from UCSD discovered that several implementations of the SSH protocol have been potentially leaking information about their keys and they came up with a way of exploiting it. Every now and then, an RSA signature is made with a combination of padding and data that […]
Read MoreMore Tag
