Data Confidentiality

IP traffic travelling through the VPN is secured using 3DES secret key encryption technology. As of yet, a succesful attack method against 3DES encryption has not been found. The brute force approach, trying all possible keys (2$^{\textrm{112}}$), is impossible with current computing power. Further, the trust relationship or security association between two VPN end-points is automatically negiotiated using the Internet Key Exchange (IKE) protocol, making cryptanalysis futile.

1-8-2011 - X/OS has moved!

X/OS has moved to a new office, but stays at the Amsterdam Science Park.