2018/11/28: In cryptography, trust is mathematically provable. Everything else is just faith.
The world of the HTTPS introduction makes no claims to reality. It exists only to highlight how incredible it is that an attacker can capture every single packet of HTTPS data that your browser exchanges with Facebook, and yet still have no idea what your password is. It shows just how powerful a system can be when you combine computers with incorruptible treefolk who live in the mountains, and how even just a tiny bit of total, no-questions-asked faith in a central authority can go a long way.
In the real world there’s no such thing as incorruptible treefolk, and there’s no such thing as no-questions-asked faith in a central authority that doesn’t also quickly wreck civilization. But the real world has still managed to piece together a very serviceable public-key cryptography system by patching over the holes and omissions and naivety of the introductory world with a tartan of secondary systems known collectively as “Public Key Infrastructure” (PKI).
1998/04/10: Good cryptography is an excellent and necessary tool for almost anyone. Many good cryptographic products are available commercially, as shareware, or free. However, there are also extremely bad cryptographic products which not only fail to provide security, but also contribute to the many misconceptions and misunderstandings surrounding cryptography and security.
è la notizia dell'anno degli ambienti crypto. E non solo di quelli. WhatsApp, la app di chat che più rappresenta l'utente comune e l'utilizzo mainstream, e che oggi è controllata da Facebook, ha aggiunto uno strato di cifratura end-to-end alla sua versione Android.
The Logjam bug allows attackers to break secure connections by tricking the browser and server to communicate using weak crypto -- but why do browsers and servers support weak crypto in the first place? The answer is in the Bill Clinton-era export restrictions on strong crypto. During the first crypto wars, the Clinton administration forced
L'FBI chiede di imporre l'installazione di backdoor sui terminali protetti dalla crittografia, e lo chiede a politici americani che si confessano ignoranti in materia. Anche in Europa la cifratura dei dati è nemica dei cyber-poliziotti
The twin technologies of cryptocurrencies and cryptocontracts are going to turn contract law into a programming language". Excerpted from @ThoughtInfected: "Essentially what we are talking about is a real democratization of contractual agreements. Whereas today contracts are restricted to deals with enough value to justify a lawyers time (mortgages, business deals, land transfer etc ), in... Continue reading ...
Security on the worldwide web revolves around HTTP over TLS, or HTTPS. The prevailing scheme for resolving whether a particular certificate should be considered valid by a web browser is to distribute a list of default trusted root CAs. This brings with it a wide variety of problems, most of which are outside the scope of this documentation. For a detailed discussion, see this article written by one of the Monkeysphere developers.
Everything you wanted to know about the next generation of public key crypto.
Bruce Schneier: The NSA has huge capabilities - and if it wants in to your computer, it's in. With that in mind, here are five ways we can protect ourselves
Academic advances suggest that the encryption systems that secure online communications could be undermined in just a few years.
GnuPG stands for GNU Privacy Guard. GnuPG is an open implementation of OpenPGP ( Pretty Good Privacy ) standard as defined in RFC 4880. In this article we
Come2OrderDC provides you Coupons and Promotion Codes for the top Online Retailers to save on your Orders!
Excepting Jersey Shore participants, people generally value privacy and it's a bigger issue when so much data is stored online. Ethical data controllers wi...
Having purchased the $250 cookie recipe from Neiman-Marcus, Alice wants to send it to Bob, but keep it away from Eve, who snoops on everyone's network traffic from the cubicle down the hall. How can Perl help her? Ciphers...
2003/06/15: These pages will eventually be open to the public. Right now they are inaccessible pending resolution of my court case.
ORIGINAL: These pages will eventually be open to the public. Right now they are inaccessible pending resolution of my court case.