background image
small-large-icon
Nomen Nescio

Contact Information:

E-mail: info [at] nomennesc.io PGP

Keywords:

free open source software, consultancy, analysis, hacking, training, ...

small-large-icon

Nomen Nescio

Nomen Nescio (Latin: name unknown) is a consultancy firm specialised in digital privacy and security. Nomen Nescio is available for consultancy, systems and software architecture, development, implementation, and training.

Contact Information:

E-mail: info [at] nomennesc.io PGP

Key ID: 0x65383A62 - Key Fingerprint: 3000 FE56 DE77 551F B3BF CB8E 903A B149 6538 3A62

Nomen Nescio is based in the Netherlands and registered at the Chamber of Commerce, no. 30194361

small-large-icon

Security & Privacy

Nomen Nescio can assist with:
 * Training
 * Risk-analysis
 * Counter-surveillance
 * Auditing
 * Intrusion detection
 * Hardening
 * Forensics and emergency response
small-large-icon

Security & Privacy

“There is no single solution for keeping yourself safe online. Digital security isn't about which tools you use; rather, it's about understanding the threats you face and how you can counter those threats.” - Electronic Frontier Foundation

And that is why security trainings ought to start with threat-modeling. Identifying the threats you, your application, and/or your organisation face, what risks those threats pose, and where the priorities lie, leads the path towards implementing effective policies and mitigations. Such mitigations can range from very simple policies to in-depth technical means. As the security of the whole depends on the weakest link, both are generally of equal importance. Nomen Nescio offers:

 * Training - from raising awareness within your organisation to speficic security applications and practices.
 * Risk-analysis - analytically identifying threats and determining risk, using OCTAVE/Allegro.
 * Counter-surveillance - implementing mitigations against surveillance, both on a technical and policy level.
 * Pentesting - testing the effectiveness of your security measures.
 * Intrusion detection - automated detection and mitigation of known attack vectors against your application.
 * Hardening - technical mitigations to prevent successful attacks against your application.
 * Forensics and emergency response - security incident and emergency management, incident analysis, clean-up, implementing emergency response mitigations to prevent further escalation, et cetera.

A reduced fee applies for NGO's and educational organisations.

small-large-icon

Research & Analysis

Abstract

Given the vast amount of information available online, gathering empirical data for scientific research - not in the least within digital humanities - has to a large degree become a process that can be automated, leading to larger datasets and higher statistical probability. Nomen Nescio has experience assisting with data-mining and analysis in various fields of research.
small-large-icon

Research & Analysis

“It was a pleasure to work with [Nomen Nescio] on data-mining FreeBSD's software repository and analysing activity logs” - George Dafermos, TU Delft

Nomen Nescio has a broad experience developing technical tools for academic purposes. These include, amongst others, scraping web-content, log-parsing, code-analysis, bioaccoustics, natural language processing, and graph analysis.

A recent publication in Internet Policy Review shows how tools for graph analysis on a large dataset developed by Nomen Nescio have been used.

small-large-icon

Development

#include <stdio.h>
int main(){
 const char* l[]= {"C","Perl","assembler","bash","others"};
 int i;
 printf("I speak: ");
 for(i=0;i<(sizeof(l)/sizeof(l[0]))-1;i++) printf("%s, ",l[i]);
 printf("and %s.\n",l[i]);
 return 0;
}
small-large-icon

Development

#include <stdio.h>

int main(){
        const char* l[]= {"C","Perl","assembler","bash","others"};
        int i;
        printf("I speak: ");
        for(i=0;i<(sizeof(l)/sizeof(l[0]))-1;i++){
                printf("%s, ",l[i]);
        }
        printf("and %s.\n",l[i]);
        return 0;
}

Nomen Nescio is available for software development in C, C++, assembler, Python, Perl, PHP, and R. Modeling and architecture in UML or BPMN are also optional.

A reduced fee applies for GPL-licensed software.

small-large-icon

System Engineering

Keywords:

 * System architecture
 * Implementation
 * High availability
 * Security
 * Virtualisation
 * Network Storage
small-large-icon

High Availability & Virtualisation

“Excellent knowledge with a broad spectrum of IT architecture, design and implementation of large scale virtual machine environments, bulletproof failover en load balancing IT infrastructures. Deep knowledge of mail, authentication methods and general IT services.” - Immanuel Derks, Translucent Systems

Areas of expertise:

 * System and network architecture
 * Security systems
 * LDAP
 * Zimbra
 * CEPH

Use of free open source software is (strongly) preferred. Experience with a wide variety of open source high availability, storage, and virtualisation technologies.

small-large-icon

Identity & Access Management

                +------+    +----+
         +----->| LDAP |<-->| HR |
         |      +------+    +----+
  +--------------+   ^
  | provisioning |   |     +-----+
  +--------------+   +-----| IdP |
        |                  +-----+
        v                    ^
     +--------------+        |
     | applications |--------+
     +--------------+
small-large-icon

Identity & Access Management

Nomen Nescio is available for a variety of works in the IAM sphere, including:

 * Modeling business logic
 * Implementing automated workflows
 * Developing provisioning tools
 * Implementing Self-service portals
 * Setting up and managing authentication chains
 * Federation and Single-Sign-On
 * 2Factor authentication
 * Designing and implementing (Role Based) Access Control

As always, with a preference for solutions using free open source software.