676e696f70
676e696f70.bsky.social
676e696f70
@676e696f70.bsky.social
Exploring a potential product using Shamir's Secret Sharing. Working to shape a brand before the product even has a name. Follow to watch it unfold. Building from the ground up—bumps included. This account is run by an introvert.
Leaving a postcard-sized document with the second fold sealed.
#cybersecurity #infosec #security
February 17, 2026 at 11:01 PM
Adding a perforation to the first fold allows the address to be easily torn away.
#cybersecurity #infosec #security
February 16, 2026 at 11:00 PM
In most cases, the second fold doesn’t even need to be opened unless passwords need to be recovered.
#cybersecurity #infosec #security
February 15, 2026 at 11:00 PM
The first fold can contain an overview of the service.
#cybersecurity #infosec #security
February 14, 2026 at 11:00 PM
The Z-Fold postcard is ideal for the password backup service.
#cybersecurity #infosec #security
February 13, 2026 at 11:01 PM
There are two opening steps:
1. Opening the first fold reveals two panes containing key information.
2. Opening the second fold exposes another two panes with additional information.
#cybersecurity #infosec #security
February 12, 2026 at 11:01 PM
Some businesses even use security tinting on the reverse side to protect sensitive information.
#cybersecurity #infosec #security
February 11, 2026 at 11:01 PM
The Z-Fold format typically features postal details on one side, with marketing content often found on the opposite side.
#cybersecurity #infosec #security
February 10, 2026 at 11:01 PM
The Z-Fold self-seal can also indicate tampering, making it difficult to reseal once opened.
#cybersecurity #infosec #security
February 9, 2026 at 11:01 PM
The lower postage costs make them an economical choice.
#cybersecurity #infosec #security
February 8, 2026 at 11:00 PM
In Japan, it’s common to receive Z-Fold postcards for invoices and other business communications.
#cybersecurity #infosec #security
February 7, 2026 at 11:00 PM
For distribution, Z-Fold postcards are the preferred print medium.
#cybersecurity #infosec #security
February 6, 2026 at 11:01 PM
Adding a barcode reader on the sender, receipt of a diode transmission can even be acknowledged.
#cybersecurity #infosec #security
February 5, 2026 at 11:00 PM
The only way to extract information would be physical printing.
#cybersecurity #infosec #security
February 4, 2026 at 11:01 PM
Ensuring that the password backup process remains within the air-gapped system.
#cybersecurity #infosec #security
February 3, 2026 at 11:01 PM
It's a one-way method to send data to the secure system for processing.
#cybersecurity #infosec #security
February 2, 2026 at 11:01 PM
In this environment, diode communication will play a vital role.
#cybersecurity #infosec #security
February 1, 2026 at 11:00 PM
Basically, a printer and an air-gapped PC will make up the secure environment.
#cybersecurity #infosec #security
January 31, 2026 at 11:00 PM
The secure environment would need a dedicated printer anyway.
#cybersecurity #infosec #security
January 30, 2026 at 11:01 PM
A different make/model should solve the printing issue.
#cybersecurity #infosec #security
January 29, 2026 at 11:02 PM
I had exhausted all possible solutions while testing against the printer in my office.
#cybersecurity #infosec #security
January 28, 2026 at 11:00 PM
The problem has more to do with the printer model, cups, and custom paper sizes.
#cybersecurity #infosec #security
January 27, 2026 at 11:02 PM
Oddly, the actual printing was a bigger challenge and currently remains unresolved.
#cybersecurity #infosec #security
January 26, 2026 at 11:00 PM
The layout and data structure will evolve over time, adjustments can always be made.
#cybersecurity #infosec #security
January 25, 2026 at 11:00 PM
Creating dynamic documents to print was the easy part.
#cybersecurity #infosec #security
January 24, 2026 at 11:00 PM