• Apr 24, 2019
  • Derek Zimmer
  • Governments, Open Source, Security,

Huawei Could Rebuild Trust in Their Products Through Open Source

Chinese Megacorp Huawei has been in the news over the last few months because companies and entire nations have been banning their equipment over spying concerns. There has been little public evidence of such spying taking place on a large scale, but the action of multiple countries within the fourteen eyes surveillance alliance suggests that … Continue reading “Huawei Could Rebuild Trust in Their Products Through Open Source”

0

Google’s Infinite Reach – How Google Builds a Profile on Everyone

There’s a lot of talk about the invasive practices of FaceBook right now, but somehow Google has skated by largely unfazed by the public outcry against privacy violations and the snowballing impact of too much personal information being out there with ambiguous consent from the parties being snooped on. Through the lens of privacy activism, … Continue reading “Google’s Infinite Reach – How Google Builds a Profile on Everyone”

0

  • Mar 20, 2019
  • Derek Zimmer
  • Privacy, Security, Tutorials,

Preparing for Travel – Properly Backing Up Your Android Cell Phone

When I prepare for travel, I take some steps to make sure that my protected data will not be read or otherwise mishandled by customs. I then follow-up with rigorous steps to ensure that my information and devices maintain their integrity and that I can trust them with the same degree that I did before … Continue reading “Preparing for Travel – Properly Backing Up Your Android Cell Phone”

0

Identity and Card Theft – Shielding Yourself from the Unsafe Small Business

With a constant stream of news of big organizations that have neglected their security, we often forget that the most vulnerable organizations are the small and medium businesses that don’t have the resources to build elaborate security teams. These businesses can have a single iPad, phone or dated register protecting their critical customer data. They … Continue reading “Identity and Card Theft – Shielding Yourself from the Unsafe Small Business”

0

NIST Round 2 and Post-Quantum Cryptography – The New Digital Signature Algorithms

We have been talking about the National Institute of Standards and Technologies’ contest to find the most attractive new algorithms for quantum resistance. (Part 1) (Part 2) (Part 3) In this final part, we talk about the candidates for a new standard Digital Signature Algorithm. (DSA) The core component of a secure digital signature lies … Continue reading “NIST Round 2 and Post-Quantum Cryptography – The New Digital Signature Algorithms”

0

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)

In the first article of this series, I wrote about the NIST Post-Quantum Competition and which ciphers advanced to the second round, meaning that they passed through basic scrutiny and were advanced based on having strong fundamental design and good documentation. Round 3 will see significant narrowing again, based on the relative strength of the … Continue reading “NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 3)”

0

NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)

In the previous article, I wrote about the NIST Post-Quantum Competition and which ciphers advanced to the second round, meaning that they passed through basic scrutiny and were advanced based on having strong fundamental design and good documentation. Round 3 will see significant narrowing again, based on the relative strength of the algorithms against one … Continue reading “NIST Round 2 and Post-Quantum Cryptography – The New Asymmetric Algorithms (part 2)”

0