Encryption

36 Articles 0 Followers


Dispelling modern myths about passwords

26 Nov 2020 3 minute read 0 comments Luca B

In the previous posts of this series, it has been described why in general most passwords are insecure, why everybody created insecure passwords for more than 15 years despite their best intentions, and how hackers are quickly cracking these password...

CryptoSmarts 2: Best Encrypted Messaging Apps

2 Oct 2020 6 minute read 2 comments MintDice.com

CryptoSmarts 2 MintDice is proud to bring you the second part of the CryptoSmarts series, a 100% unbiased/non-affiliate paid article set that will focus on relatively simple ways you can boost your privacy, take power away from overbearing government...

How Hackers Are Cracking Your Passwords

30 Sep 2020 4 minute read 0 comments Luca B

The previous article in this series has described why passwords which were fully compliant with the NIST recommendations from 2003 turned out to be insecure. This article, which is the third part of the series, will describe how computers are working...

15 Years of Mistakes: why everybody created insecure passwords

24 Sep 2020 4 minute read 0 comments Luca B

The previous article of this series has given an overview of the reasons why human-generated passwords are weak (they're already out there, they're predictable, and they're short) and what was the origin of all those bizarre password creation rules t...

Your Insecure Passwords and Where To Find Them

10 Sep 2020 4 minute read 0 comments Luca B

Passwords are one of the most common forms of authentication to confirm the identity of a user. As they provide the key to access accounts and services, it is fundamental to choose them carefully so that they cannot be easily guessed. In other words,...

Digital authentication: how passwords are safely stored online

7 Sep 2020 5 minute read 2 comments Luca B

Modern online services (websites and platforms) do not allow multiple unrestricted login attempts as that has been identified as a vulnerability: only a small number of wrong passwords (typically 3 to 5) can be tried before the account is locked down...

This Week in Matrix 2020-07-17

21 Jul 2020 12 minute read 0 comments MatrixComm

# Matrix Live https://www.youtube.com/watch?v=4ZY_q_jyHzo Let's hear from Christian about working on his dream projects, his thoughts on bridging, hosting, and the importance and nature of chatbots and assistants. # Dept of Status of Matrix #### "Ele...

The End of Privacy As We Know It

30 Jun 2020 1 minute read 0 comments AndyWooForever

On June 23 2020, Senator, Graham, Lindsey Introduced a Bill to the Senate by the title of S.4051. This Bill will allow law enforcement agencies to access encrypted data “and things for others purposes.”  The bill can be read here , which explains it...

A Story on How a Guy Cracked an Encrypted File with $300K in Bitcoin

7 Apr 2020 1 minute read 2 comments Abhimanyu Krishnan

Today’s most noir of stories comes in the form of former Google engineer and Chief Technology Officer (CTO) Mike Stay having to help a stranger find a whole lot of Bitcoin. Stay wrote a detailed blog post (link below), published on April 3, spoke of...

Encryption Key Management Securing your Company Data

12 Mar 2020 4 minute read 0 comments Captain Fin

EKM incorporates a centralized management tool to secure cryptographic keys that encrypt sensitive data across an organization’s distributed IT environments and locations. The increasing adoption of cloud-based deployment and a growing number of dat...