{"id":4458,"date":"2018-08-01T20:11:41","date_gmt":"2018-08-01T18:11:41","guid":{"rendered":"https:\/\/monodes.com\/predaelli\/?p=4458"},"modified":"2018-08-01T10:11:55","modified_gmt":"2018-08-01T08:11:55","slug":"curvezmq-security-for-zeromq-curvezmq","status":"publish","type":"post","link":"https:\/\/monodes.com\/predaelli\/2018\/08\/01\/curvezmq-security-for-zeromq-curvezmq\/","title":{"rendered":"CurveZMQ &#8211; Security for ZeroMQ &#8211; CurveZMQ"},"content":{"rendered":"<h1><em><a href=\"http:\/\/curvezmq.org\/\">CurveZMQ &#8211; Security for ZeroMQ &#8211; CurveZMQ<\/a><\/em><\/h1>\n<blockquote>\n<h1>\u00a0C<strong>urveZMQ<\/strong> \\curve-z-m-q\\, <em>noun<\/em>;<\/h1>\n<div id=\"content-wrap\">\n<div id=\"main-content\">\n<div id=\"page-content\">\n<div class=\"main-text\">\n<p>\u2002\u00d8\u2002\u2002CurveZMQ is an authentication and encryption protocol for ZeroMQ<br \/>\n\u00d8\u2002\u2002Based on <a href=\"http:\/\/curvecp.org\">CurveCP<\/a> and <a href=\"http:\/\/nacl.cr.yp.to\">NaCl<\/a> &#8211; fast, secure elliptic-curve crypto<br \/>\n\u00d8\u2002\u2002<a href=\"https:\/\/github.com\/zeromq\/curvezmq\">Open-source codec<\/a> for end-to-end security.<br \/>\n\u00d8\u2002\u2002Implemented in <a href=\"http:\/\/zeromq.org\">ZeroMQ 4.x<\/a> for point-to-point security.<br \/>\n\u00d8\u2002\u2002Designed and supported by <a href=\"http:\/\/www.imatix.com\/contact\">iMatix<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p class=\"excerpt\">CurveZMQ &#8211; Security for ZeroMQ &#8211; CurveZMQ \u00a0CurveZMQ \\curve-z-m-q\\, noun; \u2002\u00d8\u2002\u2002CurveZMQ is an authentication and encryption protocol for ZeroMQ \u00d8\u2002\u2002Based on CurveCP and NaCl &#8211; fast, secure elliptic-curve crypto \u00d8\u2002\u2002Open-source codec for end-to-end security. \u00d8\u2002\u2002Implemented in ZeroMQ 4.x for point-to-point security. \u00d8\u2002\u2002Designed and supported by iMatix.<\/p>\n<p class=\"more-link-p\"><a class=\"more-link\" href=\"https:\/\/monodes.com\/predaelli\/2018\/08\/01\/curvezmq-security-for-zeromq-curvezmq\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"link","meta":{"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":4,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[14],"tags":[],"class_list":["post-4458","post","type-post","status-publish","format-link","hentry","category-software-libero","post_format-post-format-link"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6daft-19U","jetpack-related-posts":[{"id":2488,"url":"https:\/\/monodes.com\/predaelli\/2017\/05\/22\/mailx-gmail-e-certificati-gabriele-merli\/","url_meta":{"origin":4458,"position":0},"title":"mailx, gmail e certificati \u2013 Gabriele Merli","author":"Paolo Redaelli","date":"2017-05-22","format":false,"excerpt":"mailx, gmail e certificati \u2013 Gabriele Merli Interessante fonte di guide ed informazioni... Spesso mi capita di dover usare mailx da riga di comando per inviare semplici mail di notifica, generalmente all'interno di uno script. Il pacchetto mailx \u00e8 questo (in centos 7) ]# yum info mailx<br \/> Installed Packages<br\u2026","rel":"","context":"In &quot;Documentations&quot;","block_context":{"text":"Documentations","link":"https:\/\/monodes.com\/predaelli\/category\/documentations\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5569,"url":"https:\/\/monodes.com\/predaelli\/2019\/05\/15\/il-vero-pericolo-per-la-sicurezza-digitale\/","url_meta":{"origin":4458,"position":1},"title":"Il vero pericolo per la sicurezza digitale","author":"Paolo Redaelli","date":"2019-05-15","format":"link","excerpt":"Il vero pericolo per la sicurezza digitale? Probabilmente risiede nella parola stessa - su en3py.net Scritto in modo da essere ben comprensibile anche dai non tecnici, mi pare non contenga particolari refusi. Fatelo leggere ai vostri figli, al vicino di casa allo zio. Insomma diffondetelo che mi pare meritevole. E\u2026","rel":"","context":"In &quot;Documentations&quot;","block_context":{"text":"Documentations","link":"https:\/\/monodes.com\/predaelli\/category\/documentations\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":14169,"url":"https:\/\/monodes.com\/predaelli\/2025\/10\/24\/how-to-emulate-hand-drawn-shapes-algorithms-behind-roughjs-shihn-ca\/","url_meta":{"origin":4458,"position":2},"title":"How to emulate hand-drawn shapes \/ Algorithms behind RoughJS | shihn.ca","author":"Paolo Redaelli","date":"2025-10-24","format":false,"excerpt":"How to emulate hand-drawn shapes \/ Algorithms behind RoughJS | shihn.ca A dive into graphics algorithms used in RoughJS - A graphics library that lets you draw in a sketchy, hand-drawn-like, style. How to emulate hand-drawn shapes \/ Algorithms behind RoughJS A dive into graphics algorithms used in RoughJS -\u2026","rel":"","context":"In &quot;Documentations&quot;","block_context":{"text":"Documentations","link":"https:\/\/monodes.com\/predaelli\/category\/documentations\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/monodes.com\/predaelli\/wp-content\/uploads\/sites\/4\/2025\/10\/cover.png?fit=480%2C480&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":3865,"url":"https:\/\/monodes.com\/predaelli\/2018\/03\/04\/tunnelbear-secure-vpn-service\/","url_meta":{"origin":4458,"position":3},"title":"TunnelBear: Secure VPN Service","author":"Paolo Redaelli","date":"2018-03-04","format":false,"excerpt":"TunnelBear: Secure VPN Service","rel":"","context":"In &quot;Senza categoria&quot;","block_context":{"text":"Senza categoria","link":"https:\/\/monodes.com\/predaelli\/category\/senza-categoria\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1805,"url":"https:\/\/monodes.com\/predaelli\/2016\/10\/18\/firejail-security-sandbox\/","url_meta":{"origin":4458,"position":4},"title":"Firejail | security sandbox","author":"Paolo Redaelli","date":"2016-10-18","format":"link","excerpt":"Firejail | security sandbox Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf. It allows a process and all its descendants to have their own private view of the globally shared kernel resources, such\u2026","rel":"","context":"In &quot;Software&quot;","block_context":{"text":"Software","link":"https:\/\/monodes.com\/predaelli\/category\/software\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/monodes.com\/predaelli\/wp-content\/uploads\/sites\/4\/2016\/10\/firetools-main.png?fit=786%2C583&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/monodes.com\/predaelli\/wp-content\/uploads\/sites\/4\/2016\/10\/firetools-main.png?fit=786%2C583&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/monodes.com\/predaelli\/wp-content\/uploads\/sites\/4\/2016\/10\/firetools-main.png?fit=786%2C583&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/monodes.com\/predaelli\/wp-content\/uploads\/sites\/4\/2016\/10\/firetools-main.png?fit=786%2C583&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":522,"url":"https:\/\/monodes.com\/predaelli\/2015\/07\/06\/top-20-nginx-webserver-best-security-practices\/","url_meta":{"origin":4458,"position":5},"title":"Top 20 Nginx WebServer Best Security Practices","author":"Paolo Redaelli","date":"2015-07-06","format":false,"excerpt":"Some of those Top 20 Nginx WebServer Best Security Practices are meant for high-volume, highly exposed to attacks site, but they are nevertheless worth noticing....","rel":"","context":"In &quot;Web&quot;","block_context":{"text":"Web","link":"https:\/\/monodes.com\/predaelli\/category\/web\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/posts\/4458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/comments?post=4458"}],"version-history":[{"count":0,"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/posts\/4458\/revisions"}],"wp:attachment":[{"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/media?parent=4458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/categories?post=4458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/monodes.com\/predaelli\/wp-json\/wp\/v2\/tags?post=4458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}