{"id":155,"date":"2009-07-08T23:24:56","date_gmt":"2009-07-08T22:24:56","guid":{"rendered":"https:\/\/www.entropywins.wtf\/blog\/?p=155"},"modified":"2009-07-08T23:24:56","modified_gmt":"2009-07-08T22:24:56","slug":"quantum-cryptography-quantum-key-distribution","status":"publish","type":"post","link":"https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/","title":{"rendered":"Quantum cryptography &#8211; Quantum Key Distribution"},"content":{"rendered":"<p><a href=\"http:\/\/en.wikipedia.org\/wiki\/Quantum_cryptography#BB84_protocol:_Charles_H._Bennett_and_Gilles_Brassard_.281984.29\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-157 alignleft\" style=\"margin-left: 10px; margin-right: 10px;\" title=\"Quantum cryptography key communication example\" src=\"https:\/\/www.entropywins.wtf\/blog\/wp-content\/uploads\/2009\/07\/cuantum-cryptography-table.gif\" alt=\"Quantum cryptography key communication example\" width=\"273\" height=\"141\" \/><\/a>While working on some issues in Maps for <a href=\"https:\/\/www.entropywins.wtf\/blog\/2009\/04\/26\/google-summer-of-code-2009\/\" target=\"_blank\">my GSoC project<\/a>, I got the latest technews mail of ACM (<a href=\"http:\/\/www.acm.org\/\" target=\"_blank\">Association for Computing Machinery<\/a>). This mail contained an headline about Quantum Key Distribution which catched my attention. After reading that mayor scientific effort is on the way to implement this security paradigm, I got really interested in how it actually works, and went to have a look at the wiki article about <a href=\"http:\/\/en.wikipedia.org\/wiki\/Quantum_cryptography\" target=\"_blank\">Quantum Cryptography<\/a>.<\/p>\n<p>I can really recommend this article to everyone who is interested in cryptography. It contains a basic explanation of the involved principles, and a detailed, but step by step, explanation of the actual encryption, and how the security is guaranteed. I won&#8217;t be implementing this alongside the <a href=\"http:\/\/en.wikipedia.org\/wiki\/Block_cipher\" target=\"_blank\">block ciphers<\/a> and <a href=\"http:\/\/en.wikipedia.org\/wiki\/Public-key_cryptography\" target=\"_blank\">public key<\/a> cryptography in <a href=\"http:\/\/www.binary-converter.com\/\" target=\"_blank\">my converter<\/a> any time soon though \ud83d\ude42<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While working on some issues in Maps for my GSoC project, I got the latest technews mail of ACM (Association&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[69,208],"class_list":["post-155","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cryptography","tag-qkd"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Quantum cryptography - Quantum Key Distribution - Blog of Jeroen De Dauw<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantum cryptography - Quantum Key Distribution - Blog of Jeroen De Dauw\" \/>\n<meta property=\"og:description\" content=\"While working on some issues in Maps for my GSoC project, I got the latest technews mail of ACM (Association&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog of Jeroen De Dauw\" \/>\n<meta property=\"article:published_time\" content=\"2009-07-08T22:24:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.entropywins.wtf\/blog\/wp-content\/uploads\/2009\/07\/cuantum-cryptography-table.gif\" \/>\n<meta name=\"author\" content=\"Jeroen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/JeroenDeDauw\" \/>\n<meta name=\"twitter:site\" content=\"@JeroenDeDauw\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeroen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/2009\\\/07\\\/08\\\/quantum-cryptography-quantum-key-distribution\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/2009\\\/07\\\/08\\\/quantum-cryptography-quantum-key-distribution\\\/\"},\"author\":{\"name\":\"Jeroen\",\"@id\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/#\\\/schema\\\/person\\\/4e2ef14f2ca7dc3a0ac137d1692b66b7\"},\"headline\":\"Quantum cryptography &#8211; Quantum Key Distribution\",\"datePublished\":\"2009-07-08T22:24:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/2009\\\/07\\\/08\\\/quantum-cryptography-quantum-key-distribution\\\/\"},\"wordCount\":140,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/#\\\/schema\\\/person\\\/4e2ef14f2ca7dc3a0ac137d1692b66b7\"},\"image\":{\"@id\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/2009\\\/07\\\/08\\\/quantum-cryptography-quantum-key-distribution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/wp-content\\\/uploads\\\/2009\\\/07\\\/cuantum-cryptography-table.gif\",\"keywords\":[\"Cryptography\",\"QKD\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/2009\\\/07\\\/08\\\/quantum-cryptography-quantum-key-distribution\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/2009\\\/07\\\/08\\\/quantum-cryptography-quantum-key-distribution\\\/\",\"url\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/2009\\\/07\\\/08\\\/quantum-cryptography-quantum-key-distribution\\\/\",\"name\":\"Quantum cryptography - Quantum Key Distribution - Blog of Jeroen De Dauw\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/2009\\\/07\\\/08\\\/quantum-cryptography-quantum-key-distribution\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/2009\\\/07\\\/08\\\/quantum-cryptography-quantum-key-distribution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/wp-content\\\/uploads\\\/2009\\\/07\\\/cuantum-cryptography-table.gif\",\"datePublished\":\"2009-07-08T22:24:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/2009\\\/07\\\/08\\\/quantum-cryptography-quantum-key-distribution\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/2009\\\/07\\\/08\\\/quantum-cryptography-quantum-key-distribution\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/2009\\\/07\\\/08\\\/quantum-cryptography-quantum-key-distribution\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/wp-content\\\/uploads\\\/2009\\\/07\\\/cuantum-cryptography-table.gif\",\"contentUrl\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/wp-content\\\/uploads\\\/2009\\\/07\\\/cuantum-cryptography-table.gif\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/2009\\\/07\\\/08\\\/quantum-cryptography-quantum-key-distribution\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quantum cryptography &#8211; Quantum Key Distribution\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/\",\"name\":\"Entropy Wins\",\"description\":\"A blog on Software Architecture, Design and Craftsmanship\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/#\\\/schema\\\/person\\\/4e2ef14f2ca7dc3a0ac137d1692b66b7\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.entropywins.wtf\\\/blog\\\/#\\\/schema\\\/person\\\/4e2ef14f2ca7dc3a0ac137d1692b66b7\",\"name\":\"Jeroen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d62e6b5b8e332335cf17854fac850d9c70ba367c4692872613c3110ebd4e009b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d62e6b5b8e332335cf17854fac850d9c70ba367c4692872613c3110ebd4e009b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d62e6b5b8e332335cf17854fac850d9c70ba367c4692872613c3110ebd4e009b?s=96&d=mm&r=g\",\"caption\":\"Jeroen\"},\"logo\":{\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d62e6b5b8e332335cf17854fac850d9c70ba367c4692872613c3110ebd4e009b?s=96&d=mm&r=g\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/jeroendedauw\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/JeroenDeDauw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quantum cryptography - Quantum Key Distribution - Blog of Jeroen De Dauw","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/","og_locale":"en_US","og_type":"article","og_title":"Quantum cryptography - Quantum Key Distribution - Blog of Jeroen De Dauw","og_description":"While working on some issues in Maps for my GSoC project, I got the latest technews mail of ACM (Association&hellip;","og_url":"https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/","og_site_name":"Blog of Jeroen De Dauw","article_published_time":"2009-07-08T22:24:56+00:00","og_image":[{"url":"https:\/\/www.entropywins.wtf\/blog\/wp-content\/uploads\/2009\/07\/cuantum-cryptography-table.gif","type":"","width":"","height":""}],"author":"Jeroen","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/JeroenDeDauw","twitter_site":"@JeroenDeDauw","twitter_misc":{"Written by":"Jeroen","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/#article","isPartOf":{"@id":"https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/"},"author":{"name":"Jeroen","@id":"https:\/\/www.entropywins.wtf\/blog\/#\/schema\/person\/4e2ef14f2ca7dc3a0ac137d1692b66b7"},"headline":"Quantum cryptography &#8211; Quantum Key Distribution","datePublished":"2009-07-08T22:24:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/"},"wordCount":140,"commentCount":0,"publisher":{"@id":"https:\/\/www.entropywins.wtf\/blog\/#\/schema\/person\/4e2ef14f2ca7dc3a0ac137d1692b66b7"},"image":{"@id":"https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.entropywins.wtf\/blog\/wp-content\/uploads\/2009\/07\/cuantum-cryptography-table.gif","keywords":["Cryptography","QKD"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/","url":"https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/","name":"Quantum cryptography - Quantum Key Distribution - Blog of Jeroen De Dauw","isPartOf":{"@id":"https:\/\/www.entropywins.wtf\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/#primaryimage"},"image":{"@id":"https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/#primaryimage"},"thumbnailUrl":"https:\/\/www.entropywins.wtf\/blog\/wp-content\/uploads\/2009\/07\/cuantum-cryptography-table.gif","datePublished":"2009-07-08T22:24:56+00:00","breadcrumb":{"@id":"https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/#primaryimage","url":"https:\/\/www.entropywins.wtf\/blog\/wp-content\/uploads\/2009\/07\/cuantum-cryptography-table.gif","contentUrl":"https:\/\/www.entropywins.wtf\/blog\/wp-content\/uploads\/2009\/07\/cuantum-cryptography-table.gif"},{"@type":"BreadcrumbList","@id":"https:\/\/www.entropywins.wtf\/blog\/2009\/07\/08\/quantum-cryptography-quantum-key-distribution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.entropywins.wtf\/blog\/"},{"@type":"ListItem","position":2,"name":"Quantum cryptography &#8211; Quantum Key Distribution"}]},{"@type":"WebSite","@id":"https:\/\/www.entropywins.wtf\/blog\/#website","url":"https:\/\/www.entropywins.wtf\/blog\/","name":"Entropy Wins","description":"A blog on Software Architecture, Design and Craftsmanship","publisher":{"@id":"https:\/\/www.entropywins.wtf\/blog\/#\/schema\/person\/4e2ef14f2ca7dc3a0ac137d1692b66b7"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.entropywins.wtf\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.entropywins.wtf\/blog\/#\/schema\/person\/4e2ef14f2ca7dc3a0ac137d1692b66b7","name":"Jeroen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d62e6b5b8e332335cf17854fac850d9c70ba367c4692872613c3110ebd4e009b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d62e6b5b8e332335cf17854fac850d9c70ba367c4692872613c3110ebd4e009b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d62e6b5b8e332335cf17854fac850d9c70ba367c4692872613c3110ebd4e009b?s=96&d=mm&r=g","caption":"Jeroen"},"logo":{"@id":"https:\/\/secure.gravatar.com\/avatar\/d62e6b5b8e332335cf17854fac850d9c70ba367c4692872613c3110ebd4e009b?s=96&d=mm&r=g"},"sameAs":["https:\/\/www.linkedin.com\/in\/jeroendedauw\/","https:\/\/x.com\/https:\/\/twitter.com\/JeroenDeDauw"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p74TBF-2v","jetpack-related-posts":[{"id":587,"url":"https:\/\/www.entropywins.wtf\/blog\/2009\/12\/08\/quantum-bukkit-app\/","url_meta":{"origin":155,"position":0},"title":"Quantum Bukkit app","author":"Jeroen","date":"2009-12-08","format":false,"excerpt":"Yesterday I spend about an hour creating the most useless application I've ever come up with. The main motivation for this was proving to a friend that solving a certain problem can be achieved with an algorithm containing only 1 loop and 1 if else structure. (And no GoTo's! :p)\u2026","rel":"","context":"In &quot;Programming&quot;","block_context":{"text":"Programming","link":"https:\/\/www.entropywins.wtf\/blog\/category\/programming\/"},"img":{"alt_text":"Quantum Bukkit App","src":"https:\/\/i0.wp.com\/www.entropywins.wtf\/blog\/wp-content\/uploads\/2009\/12\/qunatumBukkit.gif?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.entropywins.wtf\/blog\/wp-content\/uploads\/2009\/12\/qunatumBukkit.gif?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.entropywins.wtf\/blog\/wp-content\/uploads\/2009\/12\/qunatumBukkit.gif?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":25,"url":"https:\/\/www.entropywins.wtf\/blog\/2009\/05\/20\/bn-converter-pro-1-0-6-released\/","url_meta":{"origin":155,"position":1},"title":"BN+ Converter Pro 1.0.6 released","author":"Jeroen","date":"2009-05-20","format":false,"excerpt":"I finally finished the last details on BN+ Converter Pro after some extensive testing, and released the new 1.0.6 version. BN+ Converter Pro 1.0.6 Like I wrote before, quite some features got postponed to future versions, but still a lot of new functionality has been implemented. Here you have a\u2026","rel":"","context":"In &quot;Programming&quot;","block_context":{"text":"Programming","link":"https:\/\/www.entropywins.wtf\/blog\/category\/programming\/"},"img":{"alt_text":"BN+ Converter Pro 1.0.6","src":"https:\/\/i0.wp.com\/www.entropywins.wtf\/blog\/wp-content\/uploads\/2009\/05\/bncpro106text.gif?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":945,"url":"https:\/\/www.entropywins.wtf\/blog\/2010\/08\/12\/visible-awesomeness-at-last\/","url_meta":{"origin":155,"position":2},"title":"Visible awesomeness at last","author":"Jeroen","date":"2010-08-12","format":false,"excerpt":"Since my last blog post about my GSoC project, which aims to bring more awesome deployment capabilities to MediaWiki, I've been putting my time into both the Distribution and Deployment extensions. I was pleased to find a bunch of stuff was easier to do then I had imagined, and now\u2026","rel":"","context":"In &quot;Programming&quot;","block_context":{"text":"Programming","link":"https:\/\/www.entropywins.wtf\/blog\/category\/programming\/"},"img":{"alt_text":"Planned architecture for the initial versions of the MediaWiki deployment extensions","src":"https:\/\/i0.wp.com\/www.entropywins.wtf\/blog\/wp-content\/uploads\/2010\/08\/MedaWiki-deployment-initial.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.entropywins.wtf\/blog\/wp-content\/uploads\/2010\/08\/MedaWiki-deployment-initial.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.entropywins.wtf\/blog\/wp-content\/uploads\/2010\/08\/MedaWiki-deployment-initial.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.entropywins.wtf\/blog\/wp-content\/uploads\/2010\/08\/MedaWiki-deployment-initial.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":941,"url":"https:\/\/www.entropywins.wtf\/blog\/2010\/08\/07\/distribution-extension-for-mediawiki\/","url_meta":{"origin":155,"position":3},"title":"Distribution extension for MediaWiki","author":"Jeroen","date":"2010-08-07","format":false,"excerpt":"With only 2 days till the suggested Google Summer of Code 'pencils down' date, and a week longer until the firm one, I'm using my remaining time to get some basic functionality working for my GSoC project. I've started creating a new extension called Distribution that will provide an API\u2026","rel":"","context":"In &quot;Programming&quot;","block_context":{"text":"Programming","link":"https:\/\/www.entropywins.wtf\/blog\/category\/programming\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":809,"url":"https:\/\/www.entropywins.wtf\/blog\/2010\/05\/01\/bn-converter-pro-1-1-0-released\/","url_meta":{"origin":155,"position":4},"title":"BN+ Converter Pro 1.1.0 released","author":"Jeroen","date":"2010-05-01","format":false,"excerpt":"Two months back I dug up the project files of BN+ Converter Pro, a .Net application I created when I was in secondary school, and did some high level refactoring to optimize it for .Net 4.0 and version 3 of my .Net class library. This was soon after I released\u2026","rel":"","context":"In &quot;Programming&quot;","block_context":{"text":"Programming","link":"https:\/\/www.entropywins.wtf\/blog\/category\/programming\/"},"img":{"alt_text":"BN+ Converter Pro 1.0.6","src":"https:\/\/i0.wp.com\/www.entropywins.wtf\/blog\/wp-content\/uploads\/2010\/05\/Bnc1.0.6.gif?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":962,"url":"https:\/\/www.entropywins.wtf\/blog\/2010\/08\/20\/end-of-google-summer-of-code-2010\/","url_meta":{"origin":155,"position":5},"title":"End of Google Summer of Code 2010","author":"Jeroen","date":"2010-08-20","format":false,"excerpt":"As Google Summer of Code (GSoC) 2010 has ended, I'm writing this blog post to outline what I've done during the coding period and what the results are. Thanks go to the Wikimedia Foundation and Google for providing the opportunity to do this project, Brion Vibber, who mentored me, and\u2026","rel":"","context":"In &quot;Programming&quot;","block_context":{"text":"Programming","link":"https:\/\/www.entropywins.wtf\/blog\/category\/programming\/"},"img":{"alt_text":"Google Summer of Code 2010","src":"https:\/\/i0.wp.com\/www.entropywins.wtf\/blog\/wp-content\/uploads\/2010\/08\/2010_NoURL_300x267px.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.entropywins.wtf\/blog\/wp-json\/wp\/v2\/posts\/155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.entropywins.wtf\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.entropywins.wtf\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.entropywins.wtf\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.entropywins.wtf\/blog\/wp-json\/wp\/v2\/comments?post=155"}],"version-history":[{"count":0,"href":"https:\/\/www.entropywins.wtf\/blog\/wp-json\/wp\/v2\/posts\/155\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.entropywins.wtf\/blog\/wp-json\/wp\/v2\/media?parent=155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.entropywins.wtf\/blog\/wp-json\/wp\/v2\/categories?post=155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.entropywins.wtf\/blog\/wp-json\/wp\/v2\/tags?post=155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}