PinnedPublished inASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 4, 20241Mar 4, 20241
PinnedPublished inASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193
Apple Steps Back Their SecurityThe fallback for law enforcement agencies has always been the place where files are stored, and all the best encryption within end-to-end…2h ago2h ago
The Proper Password Hasher and Memory Buster: Argon2You know those tables that tell you how long your password will be cracked in? Well, they are all a bit silly as they do not take into…4d ago14d ago1
(CryptoRoll-ups and HashOops. That title looks a bit like clickbait for one of those dodgy social media posts. The roll-up I mean here are JavaScript code…6d ago6d ago
Being Proud and QuestioningYou can be proud of your country, your city, and your community and support it in doing great things and in a shared belief. You can wave a…Feb 12Feb 12
The Rise of the Machine and Believe in PrivacyAnd, so, 5% of Meta’s workforce is being made redundant, and the company is targeting low perceived performance — in a similar approach to…Feb 121Feb 121
Elliptic Curve Cryptography (ECC) QuestionsFor cybersecurity professionals, here’s a quick quiz on ECC (Elliptic Curve Cryptography):Feb 91Feb 91
Published inASecuritySite: When Bob Met AliceCreating Your Own Symmetric Key Cipher in a Web PageJavaScript is both wonderful and a nightmare. So, let’s use it to create a simple symmetric key cipher using AES GCM. First, open up a…Feb 3Feb 3
Random Values — In the BrowserAt the core of cryptography is the generation of random numbers. These can be true random numbers — such as those generated by the noise…Feb 21Feb 21