technology
- Self-Signed Certificates (10 Nov 2024)
How to create your own CA and why this is useful - Dual-Use: How AI is Shaping the Future of Cybersecurity (05 May 2023)
Artificial intelligence's pivotal role in threatening and strengthening cybersecurity - The Lightning Network - Revolutionizing Bitcoin Transactions (06 Mar 2023)
Revolutionizing Bitcoin Payments with the Lightning Network - Roundup October 2022 (31 Oct 2022)
Technology and Security News from October 2022 - Roundup September 2022 (29 Sep 2022)
Technology and Security News from September 2022 - Roundup August 2022 (30 Aug 2022)
Technology and Security News from August 2022 - Roundup July 2022 (31 Jul 2022)
Technology and Security News from July 2022 - Roundup June 2022 (26 Jun 2022)
Technology and Security News from June 2022 - Roundup May 2022 (29 May 2022)
Technology and Security News from May 2022 - Roundup April 2022 (25 Apr 2022)
Technology and Security News from April 2022 - Setting Up the Ledger Nano S Wallet (24 Apr 2022)
State-of-the-art security for crypto assets - Roundup March 2022 (22 Mar 2022)
Technology and Security News from March 2022 - Raspberry PI - 10 Years of hacking (13 Mar 2022)
A tinker computer celebrates birthday - Roundup February 2022 (22 Feb 2022)
Technology and Security News from February 2022 - Cloud & Schrems II: What now? (30 Jan 2022)
Technical Measures to address Schrems II - Roundup January 2022 (27 Jan 2022)
Technology and Security News from January 2022 - Roundup December 2021 (29 Dec 2021)
Technology and Security News from December 2021 - The Scalability Problem Of Bitcoin (30 Nov 2021)
Bitcoin - Secure Development - Lifecycle Models (09 Feb 2021)
Secure Software and System Development - lifecycle - Secure Development - Basic Principles (06 Feb 2021)
Secure Software and System Development - Requirements - Secure Development - Programming Languages (20 Jan 2021)
Secure Software and System Development - Programming Languages - Tor - 25 Years of Anonymization (30 Nov 2020)
The great anonymization project - CVE - The Common Vulnerabilities and Exposures System (01 Nov 2020)
Overview of the CVE System - Zero Trust Security (28 Aug 2020)
never trust, always verify - Progressive Web Application (06 Aug 2020)
inherently web-centric - Data Anonymization (04 Aug 2020)
Anonymized is not anonymous - Network Vulnerability Scanner (12 Jul 2020)
detect vulnerabilities in networks - Security Awareness - Security Culture (12 May 2020)
Building a strong security culture - Security Awareness - Threat Landscape (01 May 2020)
Overview of attacks and actors - System Architecture - Shift To The Client (16 Feb 2020)
The impact of privacy laws on System Design - GDPR - The Minimum (01 Feb 2020)
A GDPR Guide for Entrepreneurs to avoid data privacy debt - TCP/IP - Internet Protocol Suite (29 Jan 2020)
The Internet protocol suite is a set of protocols used in the Internet and similar computer networks. - OSI Model - Open Systems Interconnection (12 Jan 2020)
A conceptual model that characterizes and standardizes the communication of systems. - The Holiday Gift Guide (27 Nov 2019)
Secure Gifts for the Holiday Season. A end of the year list of gift ideas to my readers. - U2F - Universal 2nd Factor Authentication (14 Nov 2019)
A secure authentication standard created by the FIDO Alliance - Social Credit Systems (20 Oct 2019)
Social Credit Systems Could Be Contagious - Cryptographic Deletion (08 Oct 2019)
Secure deletion is a requirement in times of cloud computing and GDPR - PGP - The Web of Trust is Dead (06 Aug 2019)
Signature Spam kills WoT - Password Entropy (11 Jun 2019)
Entropy in Passwords, how to calculate it and what it actually means - Adaptive Transaction Security by Contact Frequency (27 May 2019)
When the frequence of interaction between people defines the security level - Cryptography - Applications (24 May 2019)
Applied Cryptography - Cryptography - Hash Functions & Digital Signatures (21 May 2019)
Hash Functions & Digital Signatures - Cryptography - Asymmetric Key Algorithms (16 May 2019)
Public-Key Cryptography - Cryptography - Symmetric Key Algorithms (14 May 2019)
Symmertric Cryptography - Cryptography - History & Basics (12 May 2019)
The history and basics of Cryptography - Cyberwar - A Sci-Fi Reality (06 May 2019)
How Cyberpunk predicted the future - GDPR, Passwords, Hashing and You (24 Apr 2019)
New obligations regarding password systems - Vulnerability Disclosure at SignUp (18 Apr 2019)
Disclosure of Account Vulnerabilities during SignUp avoid credential stuffing attack - Fraud Detection with GPS and Airplanes (17 Apr 2019)
Fraud Detection with Haversine