Directions Of The Cybersecurity Industry
Covid crisis and the forced work-from-home comes with the rapid transformation of a traditional established company to an online only business with most of the work force working remote.
Posted
#Articles
Covid crisis and the forced work-from-home comes with the rapid transformation of a traditional established company to an online only business with most of the work force working remote.
Posted
#Articles
Tracking Waze drivers with UI elements.
Posted
#Articles
Leverage PKCS#11 support in curl to authenticate with the Vault's TLS Certificates Auth Method
Posted
#Articles
There is a myriad of problems that comes from the "Build it, maintain it, operate it" territory.
Posted
#Articles
Let's check if public keys are valid elliptic curve points according to a secp256k1 parameters.
Posted
#Articles
Modern key management in a large organization is primarily described by bureaucratic procedures and compliance requirements due to financial liability. No one personnel hold all the keys required for a task. To minimize the need for trust in a day to day operations, the problem is partially solved with the three basic principles - separation of duties, dual control and split knowledge.
Posted
#Articles
With the current state of technology and the massive boom in the implementation of encryption libraries, decentralized, trustless infrastructure services, and cryptocurrencies, we can expect a gradual movement towards more resilience in the field of malware development.
Posted
#Articles
The Pond is asynchronous, encrypted, forward-secure messaging application written by in Go programming language. The Pond’s graphic interface looks like an email client from the early 90s, but under the surface it’s doing a good job protecting end-to-end communication using common hipster state of the art encryption protocol. To be honest, I had some hard time make its source code running so I have created a guide for you. Let’s analyze it a little bit more.
Posted
#Articles
Inspired by EFF’s, I have decided to analyze some not so well-known secure messaging applications. I am going to analyze only open-source solutions and the first application is Bitmessage. Bitmessage is a decentralized, encrypted, peer-to-peer, trustless communication protocol written in Python with Qt GUI.
Posted
#Articles