Categories » Encryption

Tor Is Being Used as a Safe Haven for Victims of Cyberstalking- 9 May 2014

9 May 2014- Vice News Tor Is Being Used as a Safe Haven for Victims of Cyberstalking

How Al-Qaeda Uses Encryption Post-Snowden- 8 May 2014

8 May 2014- Recorded Future How Al-Qaeda Uses Encryption Post-Snowden (Part 1)

New Chinese Supercomputer Goes Beta (Tianhe 2 Ahead Of Schedule And On Budget)- 5 May 2014

5 May 2014- Popular Science New Chinese Supercomputer Goes Beta (Tianhe 2 Ahead Of Schedule And On Budget)

Bitcoin 101: Experiment Will Give MIT Undergrads $100 of Cryptocurrency- 30 April 2014

30 April 2014- Vice News Bitcoin 101: Experiment Will Give MIT Undergrads $100 of Cryptocurrency

Inside the ‘DarkMarket’ Prototype, a Silk Road the FBI Can Never Seize- 24 April 2014

24 April 2014- Wired Inside the ‘DarkMarket’ Prototype, a Silk Road the FBI Can Never Seize

Heartbleed as Metaphor- 21 April 2014

21 April 2014 Heartbleed as Metaphor

U.S. Promotes Network to Foil Digital Spying- 20 April 2014

20 April 2014 U.S. Promotes Network to Foil Digital Spying

Private crypto keys are accessible to Heartbleed hackers, new data shows- 12 April 2014

12 April 2014- Ars Technica Private crypto keys are accessible to Heartbleed hackers, new data shows

Why Every Website Should Use Always On SSL (AOSSL)- 11 April 2014

11 April 2014- SecBrief Why Every Website Should Use Always On SSL (AOSSL)

NSA Said to Exploit Heartbleed Bug for Intelligence for Years- 11 April 2014

11 April 2014- Bloomberg NSA Said to Exploit Heartbleed Bug for Intelligence for Years

Building A Raspberry Pi VPN Part One: How And Why To Build A Server- 10 April 2014

10 April 2014- ReadWrite.com Building A Raspberry Pi VPN Part One: How And Why To Build A Server

“Unbreakable” security codes inspired by nature- 3 April 2014

3 April 2014- Science Daily “Unbreakable” security codes inspired by nature

Wickr Spreads Its ‘Leave No Trace’ Messaging- 1 April 2014

1 April 2014- Dark Reading Wickr Spreads Its ‘Leave No Trace’ Messaging

Study Shows Flawed U.S. Encryption Standard Could Be Broken in Seconds- 31 March 2014

31 March 2014- MIT Technology Review Study Shows Flawed U.S. Encryption Standard Could Be Broken in Seconds

Stoners Now Have Their Own Cryptocurrency: PotCoin- 27 March 2014

27 March 2014- Vice.com Stoners Now Have Their Own Cryptocurrency: PotCoin

Young MIT researcher develops NSA-proof encryption service- 27 March 2014

27 March 2014- ItProPortal.com Young MIT researcher develops NSA-proof encryption service

How do you Know if an RNG is Working? -19 March 2014

3/19/2014- Matt Green’s Crypto Blog How Do You Know if an RNG is Working?

“The Face Behind Bitcoin”- 6 March 2014

3/6/2014- Newsweek The Face Behind Bitcoin Warning, the account presented in this article is factually weak and has been widely derided, but is of historical interest.

Cryptography Breakthrough Could Make Software Unhackable – February 3, 2014

2/3/2014 – Wired Cryptography Breakthrough Could Make Software Unhackable

Three Must Watch Videos to Understand Why Bitcoin is Disruptive- 14 August 2014

14 August 2014 Three Must Watch Videos to Understand Why Bitcoin is Disruptive