Articles

Commercial Cryptographic Key Management in 2018

Modern key management in a large organization is primarily described by bureaucratic procedures and compliance requirements due to financial liability. No one personnel hold all the keys required for a task. To minimize the need for trust in a day to day operations, the problem is partially solved with the three basic principles - separation of duties, dual control and split knowledge.

Posted

#Articles

The Future Of Malware

With the current state of technology and the massive “boom” of the implementation of the encryption libraries, decentralized, trustless infrastructure services and the cryptocurrencies, we can expect slow movement toward more resilience in the field of malware development

Posted

#Articles

Secure communication: Pond

The Pond is asynchronous, encrypted, forward-secure messaging application written by in Go programming language. The Pond’s graphic interface looks like an email client from the early 90s, but under the surface it’s doing a good job protecting end-to-end communication using common hipster state of the art encryption protocol. To be honest, I had some hard time make its source code running so I have created a guide for you. Let’s analyze it a little bit more.

Posted

#Articles

Secure communication: Bitmessage

Inspired by EFF’s, I have decided to analyze some not so well-known secure messaging applications. I am going to analyze only open-source solutions and the first application is Bitmessage. Bitmessage is a decentralized, encrypted, peer-to-peer, trustless communication protocol written in Python with Qt GUI.

Posted

#Articles