Thank you for visiting this page. To guarantee your privacy, this page does not collect, store or use
any data about you, nor any other data for that matter. It does not store cookies on your device neither.


Robin Pynckels & Filip Pynckels

Electronics    playground

A hardware random number generator USB stick
(click here to see the security assessment document)

Feb 20, 2021

A hardware random number generator USB stick Since some time, the Direction ICT of the Belgian Ministry of Home Affairs is looking into crypto systems. Within that framework, a preliminary study[1] has been made. With this study as a basis, priorities were decided upon, and a first project outline was made. The first priority was the development of a hardware random number generator. Since budgets and staff are limited, outsourcing nor insourcing this project were an option, so the authors decided to invest some time in this project.

The document is a work in progress and must be read as such, but we got a number of questions about the state of play of this project, so we already make available what we have.

[1] “Cryptosystems in an ever-changing world”, Freya Verbeke (under the guidance of Prof. Marnix Van Daele, UGent, Faculty of Sciences, Department of Applied mathematics, computer science and statistics), 8 august 2019

A hardware random number generator shield for the Visitekaarduino
(click here to see the security assessment document)

Sep 9, 2020

A hardware random number generator shield for the Visitekaarduino This project generates true random bit sequences. A quality test of the random bit strings is performed using different open source tests, and the developed hardware qualifies with ease.

The use of true random bit sequences in stead of pseudo random number bit strings is useful in the domains of data encryption, mathematics, physics, engineering sciences, etc.

Visitekaarduino, an Arduino on a business card
(click here to see the security assessment document)

Feb 7, 2020

Visitekaarduino - An Arduino on a businesscard This project elaborates on the design of a fully functional Arduino on a business card. All necessary information is given to make it possible to understand the assembling, the programming and the functioning of this Visitekaarduino. This includes the schematics, the PCB design, the bill of materials, some programming code, etc.

The major challenge was to create a price-competitive business card (for volumes from 250 and more) that gets more attention than a plain vanilla one. So, the overhead cost, like shipping cost, engineering cost, etc. can be a bit higher, as long as the price per board is low enough. The higher the volumes, the more beneficial this Visitekaarduino becomes.


Microsoft can secretly update Raspberry OS
(click here to see the security assessment document)

Feb 6, 2021

Microsoft can secretly update Raspberry OS To the surprise of a number of administrators of Raspberry OS (before called Raspbian), the latest update came with an extra software key that permits Microsoft to make changes to the Raspberry OS each time the user or administrator does an update

It goes without saying that this did not fall well with the Raspberry and Linux communities who have lost their trust in Raspberry and see this case as a confirmation that Microsoft has an uncontrollable urge to be present on each computer and gather user data, even if it has to be done secretly.

From my side, I rather think that it's not artificial intelligence but natural stupidity that will destroy the world. With other words: it's not even sure that Microsoft is aware of the fact that their software is added to Raspbian OS, nor that the Raspberry Pi Foundation was aware of the consequences of their decision to put VScode in Raspberry OS LITE.

WarDog, the new war driving in miniature
(click here to see the security assessment document)

Aug 1, 2019

Wardog - War driving in miniature The expression wardriving is a generally known concept. It means loading your car with the necessary equipment (such as there are one or more notebooks, a couple of antenna’s, a good GPS device, etc.), driving to a place that is (estimated to be) close enough to one or more wireless antenna’s, and starting to scan the wireless antenna’s and networks that belong to them.

This paper is written to show that it is not necessary to be an electronics genius to create a device that is so small that it can be hidden in plain sight, and that can get organizations in trouble.

Divided we stand, divided we fall - A security risk analysis for Belgium
(click here to see the security assessment document)

Jun 11, 2017

Starting from a geopolitical analysis of the part of the world that influences the Belgian security situation, this paper focuses deeper on one example of risk that can have major influences on the countries of the NATO and the European Union.

Using this risk analysis, we focus in on the Belgian situation. Especially elements that make Belgium vulnerable in the next decade are studied.

The author wishes to stress again that special care has been taken not to use any material that is classified within NATO, EU or BE context. All information that is used to make this analysis is freely available for anyone who wants to take the time to look for it, read it and assimilate it.

How to hack the identity of a Tor user
(click here to see the security assessment document)

Jan 17, 2016

Absolute anonymity is an illusion. This publication shows, on a high level, how even Tor users (or users of other anonymizing networks) can be identified by means of fingerprinting, the use of a honeypot, etc.

After a general introduction and a closer look at the Tor network, the steps to find the identity of a Tor user is explained.

Note that this publication does not give the details of the stated techniques in order not to pass the legal boundary.

Free    Software

Why free software ?
(click here to see the security assessment document)

July 28, 2020

Free Software, Free Society Thomas Watson, the president of IBM from 1914 to 1956, said he thought there was a world market "for maybe five computers". Most people today critcise this idea as being one of the worst visions ever. But was it? The question is rather: what is a computer? If we define it as a single machine, then Watson's vision was a little flawed. If, however, we define a computer as a collective of computing power, then maybe Watson was not all that far from the thruth.

If we look at the computing power collectives, also called clouds, we see a limited number of major players killing (they call it: taking over and integrating, Startrek called it: assimilating) all competition. And what rests are the Microsoft, Google, Amazon, ... clouds (data centers) of this world. Maybe not five, but in each case very few.

So, what choice do we have, as an individual, as a company, as a government? The computing collectives dictate that we must go to the cloud with our data (even sensitive business or security data). In fact, they don't dictate it, they just make it virtually impossible to keep our data protected within our perimeter. They abandon software that runs in our perimeter. And the software that still runs within our perimeter contacts their infrastructure several times per use we make of it. And, of course, purely with as goal to make their software better, they transfer all kinds of information from our machines to their datacentra.

All of this has as a consequence that only the economies of a few countries are fed with vast amounts of money, whereas most countries (that do not have one of the major players headquarters on their territory) don't even have a chance to grow a local technology economy, despite their vast quantity of very knowledgeable citizens. And the more data the companies get about us, the more they can use that data to get even more money coming their way.

Why does my flashlight need access to my contact list? Besides the economic point, there is also the privacy and security point. It is well known that some proprietary software provides access to our machines and our data for certain security agencies. It is well known that some proprietary protocols are designed in a way that there are backdoors to eavesdrop. Sometimes to get an economic advantage, sometimes to get a world dominance advantage, sometimes to suppress a part of the population, ... And still the international community stays mute in most cases. Even governments put their data in the major clouds. Intentional or sheer stupidity?

Permit me, in this context, to refer to my publication: "Divided we stand, divided we fall A security risk analysis for Belgium for the next decade" that can be found in the chapter "Security" below.

I believe in stimulating the local economies around the globe by using the economic model of free software with local support. I also believe that free open source software and hardware can be more secure due to more people looking at and contributing to the sources. I believe that all people should get the chance to make a living in the technology branch (call it 'the new economy') and not only the happy few that have the luck to be born at the right place and to work for the right companies. The more people work in technology, the more evolution we will know, and the better the world will be for all of us (and not only for the happy few.

Alternatives for the Linux kernel unexported kallsyms symbols
(click here to see the security assessment document)

July 14, 2020

On april 7th, 2020 Mr Deacon authored and Mr. Torvalds committed a pull request on the Linux kernel. More specific, from kernel 5.7.7 on, some kallsyms symbols/functions will no longer be exported by the kernel. This has as a consequence that a major number of third party modules will no longer install after an update to the latest kernel version.

This paper looks into the problem, proposes a number of alternatives, and show how these alternatives can be implemented without causing havoc in the source code of the mentioned modules (read: relatively easy to change once one knows how).

Information    technology

S80 computer Ver. 2.0 - A retro Z80 with memory mapping
(click here to see the security assessment document)

Sep 21, 2019 - Update May 31st, 2020

S80 - Z80 computer with 2 Mb of memory This document is the sequel of the S80 computer Ver. 1.0/i> document. It continues where the previous document ended: the building of the second version of the S80 computer. The boards are smaller, the memory size extended to 2Mb by means of memory mapping.

This second version is hardware and software compatible with the first version of the S80.

The focus of this document is on the memory 2.0 board with memory mapping addressing logic. A first test board had flaws in the design (see previous document) and the design cycle of the second test board has been extended with VHDL software testing and breadboard testing. Updates of this document will also handle the creation of a wire-wrapping test board as a final test before ordering test PCB's. Further updates will handle all future steps up until the production version will be available.

S80 computer Ver. 1.0 - A retro Z80 with stackable segments
(click here to see the security assessment document)

Aug 13, 2019 - Update Aug 17, 2019

S80 - Z80 computer with stackable components This document explains the design, building and programming of a Z80 based computer with retro technology. It starts from the choice of a computer architecture, continues with a description of the different functional and architectural components that are needed to construct a functioning computer, handles the functional schematics, the design of the PCB's and some of the test setups.

The software development environment is explained, and the different steps in the development of hardware test programs, a small loader BIOS and a general program written in C are explained.

Finally, supplementary appendices will be added with descriptions of new board versions, Internet of Things (IoT) extensions, etc.


How to achieve rational data integration on the European level
(click here to see the security assessment document)

Nov 17, 2016 - Université de Grenoble Alpes

We live in an era where data is available on a large scale, and in a plethora of different formats. The major question that arises is no longer if we have the data, or how to find the data, but how to find useful information within the available data and how to decide if the information we find is correct and complete.

This is not different on the European level in the domain of freedom, security and justice. Of course, there is always data that is not available in a database. But much worse is the fact that data is available more than once in several databases, spread all over Europe, and in multiple formats. How can one be sure that the data one is using are correct and complete, and that different databases don’t store different versions (or erroneous versions) of the same data.

And what about the Member States? Are they in the possibility to get the necessary data at the right moment in time to take the best possible decisions with regards to the domain of freedom, security and justice. What information are they allowed to get out of the European databases, what information can they technically get out of these databases, and what is the cost for doing so? Let’s not forget that the European budgets are also paid for by the Member States and hence by all of us.

Neural    networks

Planning the Spinning Process by Means of Neural Networks and Genetic Algorithms
(click here to see the security assessment document)

1997 - University of Maribor, DMMI congress proceedings

Planning the Spinning Process by Means of Neural Networks and Genetic Algorithms. A general overview of the possibilities within the domain of spinning of Neural Networks with parameters that change in time by means of Genetic Algorithms.

This text is accepted for publication in the DMMI congress proceedings, University of Maribor, Portoroz, Slovenia

Use of Neural Nets to Simulate the Spinning Process
(click here to see the security assessment document)

1997 - Journal of the Textile Institute

The aim of the described study consists in predicting the yarn properties, given the relevant fibre properties and the production conditions. These conditions are determined by the type of machines and their settings. By means of a neural network, it is possible to determine the spinnability of the fibres above, under the given production conditions.

Once the spinnability is assured, one can predict the yarn properties by means of multiple interconnected neural networks. A method that does not oversimplify the problem is described in this publication.

Use of Neural Nets to Simulate the Spinning Process is published in the Journal of the Textile Institute, Vol. 88, No. 4, 1997, 440-448

Use of Neural Nets For Determining the Spinnability of Fibres
(click here to see the security assessment document)

1995 - Journal of the Textile Institute

It is very important for a spinner to be able to predict the degree of spinnability of a given fibre quality. Certain process conditions must be considered here. This article describes how spinnability of a given fibre quality on a rotor and ring spinning machine can be predicted with a reliability of 95% by means of a neural network. The structure and the characteristics of the neural net used will be considered in greater depth, and a simple method of implementation of such a neural net will be dealt with.

Use of Neural Nets For Determining the Spinnability of Fibres is published in the Journal of the Textile Institute, Vol. 86, No. 3, 1995, 425-437

All    kinds    of    projects

Corona - Facial protection for hospitals and elderly homes
(click here to see the security assessment document)

March 27th - June 30th, 2020

Corona - Facemask By now, it's clear to everyone that, especially during the Corona era, the health care workers are the real heroes of a modern society. They put their lives in danger to help Corona (COVID-19) patients. They are in the line of fire in a war with an invisible but lethal enemy.

Since there is a major shortage of protection materials that these people need, 7 volunteers of Richtpunt campus Zottegem (PTIZ), have taken up the initiative to produce safety masks that can be worn on top of other face protection equipment.

My role, albeit a small one, was to help gather the means to make masks. Around 8000 masks have been produced and distributed amongst health care workers in hospitals and elderly homes.