27 results
tagged
cryptography
Apple says an elaborate rotating key scheme will soon let you track down your stolen laptop, but not let anyone track you. Not even Apple.
At Monday’s WWDC conference, Apple announced a cool new feature called “Find My”. Unlike Apple’s “Find my iPhone”, which uses cellular communication and the lost…
How Banksy created a private key art authentication system with forged ten pound bank notes ripped in half.
The first rule of PAKE is: nobody ever wants to talk about PAKE. The second rule of PAKE is that this is a shame, because PAKE — which stands for Password Authenticated Key Exchange — is actually o…
A crypto primer in the form of Ikea instructions
Using structured encryption to search protected photos in the cloud
A History of Alice and Bob, by Quinn DuPont and Alana Cattapan (created 2017).
The basics of crypto, in 4.5 pages, using only small words lawmakers can understand
A new voting system promises to avoid unnecessary recounts---and prove when they're necessary, too.
Beveiliging staatsgeheimen: De overname van Fox-IT in november 2015 kwam voor de overheid onverwacht. De overheid wil nu bij een volgende overname de optie om het bedrijfsonderdeel dat staatsgeheimen versleutelt te kopen.