Where and how post-quantum cryptography is being used in 2024
Where and why quantum-resistant cryptography has already been implemented, and what compatibility issues it caused.
18 articles
Where and why quantum-resistant cryptography has already been implemented, and what compatibility issues it caused.
The U.S. National Institute of Standards and Technology (NIST) has issued the first post-quantum encryption standards — FIPS 203, FIPS 204, and FIPS 205.
How hackers exploit chatbot features to restore encrypted chats from OpenAI ChatGPT, Microsoft Copilot, and most other AI chatbots.
The KeyTrap DoS attack, which can disable DNS servers with a single malicious packet exploiting a vulnerability in DNSSEC.
Everything you wanted to know about Google account passkeys: how they work, why they’re needed, where to enable them, how to configure them, and what storage options are available.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
We explain for laypeople what end-to-end encryption is and how it enables private, secure communication for us all.
We explore how encryption protects your data and why quantum computers might shake things up.
Quantum computers are set to change our approaches to data encryption. When that will happen is not yet clear, but we do know when companies need to start preparing — right now.
Researcher Fabian Ising, speaking at the Chaos Communication Congress, showed the limits of PDF encryption’s strength.
Researchers try to modify the contents of a signed PDF file without invalidating the signature.
According to recent news, quantum supremacy is reached. What should we do about it?
Want to protect your intimate photos from ever going public? Facebook has a suggestion: Upload them yourself!
About a year ago, a number of people, truly passionate enthusiasts and straight-up frauds alike, started manically preaching the coming of the Blockchain Almighty. It will change the world forever,
Quantum computers are said to be coming quite soon and will change the world forever. While that phrase would typically mean a revolution in physics and medicine, the change which
Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.