Sobre Ola Bini
Ola is more than just a person detained by the authorities in Ecuador. He's a person with a distinguished career in software development as well as a friend and colleague to many. Here's a timeline for Ola with the highlights:
2009-2009 Contributions to JRuby project
Ola was pivotal in the JRuby community bringing the power and productivity of Ruby to the Java Virtual Machine so that enterprise teams had an additional way of deploying Ruby solutions for a multitude of application possibilities. See Ola's commits to Jruby.
2009 -2011 His own programming language 'Ioke'
Ola made his own experimental language for the JVM called "Ioke". See his GitHub organization and an interview with him on the language in 2014
His other own programming language 'Seph'
Ola made his own experimental language called "Seph", which goal was concurrency and expressiveness. See his GitHub organization
JesCov
JesCov is an open source tool for measuring code coverage of JavaScript. It makes it possible to find out both line and branch coverage from any ES3-compliant source code. It is not tied to any particular testing framework, but the only current integration point is for Jasmine. The general approach is based on a JSON data interchange format, which means some of the reporting tools could potentially be used against data collected in some other way than running the core JesCov project.
Find the repository here and the website here
CoyIM
CoyIM is a chat client that is safe and secure by default: no settings to change, no plugins to install, no computer configuration to change. It is a chat client created by Ola and his team. It’s website is here and the github repository is here
Gosecco for Subgraph
gosecco is a project to provide a full stack of tools necessary for working with seccomp BPF rules from Golang. The primary pieces of functionality are the parser and compiler - but the project also supports a rudimentary assembler and disassembler. It also supports an emulator that can be tweaked to provide output on whether your rules actually do what you think they should do or not. None of these tools are exposed as command line tools - they are meant to be used as libraries for higher level applications and systems.
The github repository is here. An statement from SubgraphOS thanking for its development can be found here (under the Acknowledgments section).
Enigmail
Enigmail is a seamlessly integrated security add-on for Mozilla Thunderbird. It allows you to use OpenPGP to encrypt and digitally sign your emails and to decrypt and verify messages you receive. Enigmail is free software.
Ola’s contributions focused on making Enigmail easier to contribute to. This meant to provision new machines from scratch for the project, hooking a Travis CI, adding both unit tests and larger functional tests, refactoring, add Parcimonie style support and static analysis.
You can read about Ola's thoughts about it here You can find Ola's commits here
Tor
Tor is free and open-source software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Routing program". Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis.
Ola worked on a proposal for the entry Guard algorithm (as defined in these papers).The first proposal can be found here and the discussion around it can be found here.
He also did a bunch of tests and refactorings that can be found here
Ola's thoughts about Tor can be found here
Letsencrypt
Let’s Encrypt is a free, automated, and open Certificate Authority.
Ola and his team worked with Certbot. Certbot is part of EFF’s effort to encrypt the entire Internet. Certbot is a fully-featured, extensible client for the Let's Encrypt CA (or any other CA that speaks the ACME protocol) that can automate the tasks of obtaining certificates and configuring web servers to use them. This client runs on Unix-based operating systems.
Ola's commits can be found here
OTRv4
Off-the-Record Messaging (OTR) is a cryptographic protocol that provides encryption and deniability for instant messaging conversations. OTRv4 is the fourth version of the OTR messaging protocol. OTR version 4 (OTRv4) provides better deniability properties by the use of a deniable authenticated key exchange (DAKE), and better forward secrecy through the use of double ratcheting. OTRv4 works on top of an existing messaging protocol, such as XMPP. Ola and his team did the protocol and the implementation.
- The protocol can be found here
- The website can be found here
- The Wikipedia article can be found here
- The whole repository can be found here
Additionally, Ola's team has been busy last year presenting. Here are our presentations and resources:
- A paper written for PETS2018 and the presentation
- The presentation at IETF
- The presentation at CCC (35c3)
- The presentation at COSIC
- The presentation at FOSDEM
- The presentation at LLVM Euro 2019 meeting
Libgoldilocks
A pure implementation of Ed448-Goldilocks elliptic curve. It is based on libdecaf by Mike Hamburg.