News

That’s where [bison] recently found himself when he needed to configure a device over serial, but didn’t have any way of installing the appropriate terminal emulator on his Fujitsu Lifebook C34S.
All of the cryptographic logic such as ECDH, serialization, and handshake patterns was re-implemented from scratch in Python. Even though the underlying math is the same, each BIP ends up writing its ...