Key Size in Cryptography Simplified Cryptography Primer In asymmetric or public-key encryption there are two main parts: Encryption Algorithm (RSA, ECC, …) Cryptographic key pair The two keys of the… Read more »
Your Privacy and your Web Browser is a Contradiction I am mad as hell about WebRTC and google chrome. I know this is a rant but it is disturbing that this… Read more »
Crypto Jargon Hash Functions A hash function is a completely public algorithm (no key in that) which mashes bit together in a way which is truly infeasible to untangle: anybody… Read more »
Security Pages that Count With so many sites that offer helpful security information, this is my start of the must read sites. Latest Reports ThreatPost – latest news of exploits… Read more »
We hear that the connection between our browser and a website like amazon.com is encrypted when we use https but how does that actually work? Learn about certificates and encryption in easy to understand terms.
Self Signed Certificates another Layer There is a lot of Internet press from companies and experts alike that self-signed certificates have to go away. It is a little unfair because… Read more »
Researcher Chris Paget pulled off a stunt at the Defcon security conference Saturday that required as much legal maneuvering as technical wizardry: eavesdropping on the cell phone calls of AT&T subscribers in front of thousands of admiring hackers.
SQL Injection Attacks I don’t know about you but part of my education has always been to study code and learn the latest attack techniques. I enjoy reading code and… Read more »
Your Computer is Not Infected This is starting to get tedious. These companies trying to sell you their fake windows repair software by spoofing a message on your computer screen…. Read more »