BinaryEdge - Science and Technology

Thoughts, stories and ideas.

posts by BinaryEdge

Friday

29

April 2016

Game of Torrents and data leaks

by BinaryEdge

Game of Thrones is a really good series - at BinaryEdge we are all big fans of the show and enjoy watching it. Game of Thrones is also the most pirated TV show on the internet. Since the new season was starting this week and we had just finished the development of our torrent data prototype, we thought we could take a look at the torrent downloads for the premiere…

Friday

22

April 2016

BinaryEdge hackathon - April!

by BinaryEdge

In the week of 11th of April, BinaryEdge had its first official hackathon. As a rule, we try to do what we call a "get together" every six months, where we fly everyone out to Switzerland or Portugal, chat a bit and talk about plans for the future. This also gives the ability for teams to sync between themselves and catch up. However, this time we decided to try something…

Friday

18

March 2016

Announcing: Cyberfables

by BinaryEdge

For far too long we've heard "The problem of security is always the user", so we decided to put our heads to work to try and tackle this problem. For the last couple of months we have been so focused on our B2B product that it felt great to start thinking about the complete opposite direction (B2C). We started by thinking about the approach we should take, we looked at…

Tuesday

19

January 2016

Data, Technologies and Security - Part 2

by BinaryEdge

Around 5 months ago we published a blogpost titled "Data, Technologies and Security - Part 1", this week we decided to look at part 2 and considered publishing it about some other technologies that we have analyzed. However, we got a request asking if we were still doing work around the databases of the first blogpost and instead of posting the part 2 about new technologies we decided to re-scan…

Tuesday

10

November 2015

SSH - A brief analysis of the internet

by BinaryEdge

SSH or Secure Shell For those of you that don't know, SSH is, in simple terms, an encrypted network protocol that allows network services to operate securely over an unsecured network. SSH provides a secure channel between a client and a server. Commonly used to manage remote machines and transfer files in a secure form, SSH is usually found on TCP port 22. On this blogpost we will start by…