PinnedPublished inASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into ApplicationsMar 4, 20241Mar 4, 20241
PinnedPublished inASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…Apr 22, 20193Apr 22, 20193
Published inASecuritySite: When Bob Met AliceGalaxy S25 Goes Quantum RobustYesterday, I gave two short presentations on PQC (Post Quantum Cryptography), and next week, I’m in London to give a more focused talk on…1d ago11d ago1
One of the Largest Hacks Ever? But Will The Hackers Be Able To Launder The Gains?Bybit has been hit by one of the largest hacks ever in human history, and it is thought that hackers managed to steal over $1.4 billion…4d ago34d ago3
Apple Steps Back Their SecurityThe fallback for law enforcement agencies has always been the place where files are stored, and all the best encryption within end-to-end…5d ago15d ago1
The Proper Password Hasher and Memory Buster: Argon2You know those tables that tell you how long your password will be cracked in? Well, they are all a bit silly as they do not take into…Feb 182Feb 182
(CryptoRoll-ups and HashOops. That title looks a bit like clickbait for one of those dodgy social media posts. The roll-up I mean here are JavaScript code…Feb 15Feb 15
Being Proud and QuestioningYou can be proud of your country, your city, and your community and support it in doing great things and in a shared belief. You can wave a…Feb 12Feb 12
The Rise of the Machine and Believe in PrivacyAnd, so, 5% of Meta’s workforce is being made redundant, and the company is targeting low perceived performance — in a similar approach to…Feb 121Feb 121
Elliptic Curve Cryptography (ECC) QuestionsFor cybersecurity professionals, here’s a quick quiz on ECC (Elliptic Curve Cryptography):Feb 91Feb 91