Juice jacking refers to a family of attacks on mobile devices in which a manipulated charging cable is used to […]
News
Man-In-The-Middle Attacks against Wi-Fi
Wireless network communication via Wi-Fi has today become a taken-for-granted part of everyday life. Especially on mobile devices such as […]
Web APIs for Identity Management
Browsers and the web community are continuously introducing new web browser interfaces for various use cases. Of particular interest here […]
PDF-Over
How does it work PDF-Over is your tool for frequent & efficient PDF signing. Configured according to your individual needs, […]
PDF-Over – FAQs
After clicking the ‘Sign’ button or selecting the document to be signed with automatic positioning, the error message “Signature error” appears. How can I fix this error? In most cases, the error message “Signature Error” appears when PDF-Over cannot establish a connection to the A-Trust server. Common causes include:A firewall blocking the ports or URLs required […]
Certificate Transparency for Relying Party Certificates
eIDAS 2’s European Digital Identity framework shifts control to the user via a secure wallet app. Relying Parties (RPs) willing […]
Analysis of Possible Applications of AI in Code Refactoring
This report examines the performance of four modern AI-based coding agents in modernising existing applications. The aim is to upgrade […]
Wallet Binary Transparency
Binary transparency is a security practice that ensures software binaries are verifiable and have not been tampered with. It aims […]
Implementation and Evaluation of the Digital Credentials API
The Digital Credentials API is currently being developed as part of the Web Incubator Community Group (WICG). The programing interface […]
eIDAS Embedded Disclosure Policies
Article 5a (Paragraph 5e) of the current eIDAS Regulation (“eIDAS 2”, 2024) introduces so-called Embedded Disclosure Policies. These allow an […]