Skip to content
View fbv81bp's full-sized avatar

Block or report fbv81bp

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
FBV81Bp/README.md

Hey there 👋

yet another electrical engineer here, maybe a tiny bit more innovative than usual.

📫 How to reach me: just seek fbv81bp all around the internet and you shall find.

👯 I’m looking to collaborate on: a TOR guard node protection with hashes whose key idea is the more nonces are applied to be hashed together with a potential traitor's name, the larger hash gets their identity assigned to, and such hashes can be spread without compromising user anonymity.

🔭 I’m currently working on: the digital swamp which means anti personnel mines that unarm in the presence of a cryptographically secured key hopping radio transmitter, or otherwise activate in the prescence of unknown/foreign intruders.

🌱 I’m currently learning: side channel and tamper resistance, so that I could use an LCD module and some tricky keyboard to further secure any clandestine communication with these 3 pinned modules or rather their more advanced successors...👇🏾

⚡ Fun fact: militaries usually desire such...☝🏾 but in this imperfect form it is still very much applicable to stir shit among underground organisations.

Pinned Loading

  1. AES_in_VHDL AES_in_VHDL Public

    VHDL Advanced Encryption Standard cores

    VHDL

  2. SHA2-256_in_VHDL SHA2-256_in_VHDL Public

    VHDL Secure Hash Algorithm 2 cores

    VHDL

  3. VHDL_UDP_IPv4_MAC VHDL_UDP_IPv4_MAC Public

    An ethernet endpoint faster on Artix-7 than the chip's hard IP transceivers.

    VHDL