#cryptography

[ follow ]

The Absolute Minimum Every Python Web Application Developer Must Know About Security

Never store passwords in plain text; use salted hashes and delegate password management for security.
#cybersecurity

Global police sting topples 'Ghost' criminal messaging app DW 09/18/2024

International police collaboration led to dismantling a criminal-focused encrypted platform, 'Ghost', resulting in significant arrests and prevention of violent crimes.

Chinese Hackers Use Quantum Computer to Break Military Grade Encryption

Chinese researchers claim to have made advancements in quantum computing that could threaten current encryption standards.
The use of a D-Wave quantum computer showcases the potential risk against military-grade encryption protocols.

Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers

End-to-end encrypted cloud storage platforms have critical vulnerabilities that can lead to data leaks.

How Should Bitcoiners View Quantum Computing?

Quantum computing may threaten Bitcoin's security by breaking SHA-256 cryptography, impacting its value significantly.

Chinese researchers break RSA encryption with a quantum computer

Chinese researchers can crack classic encryption using D-Wave's quantum technology, increasing concerns over the security of cryptographic systems.
This development could shorten the timeline of when quantum computers threaten common encryption methods.

A lab in the US unveils new tools to withstand encryption-breaking quantum

The introduction of new encryption algorithms aims to protect against future quantum computing cybersecurity threats.

Global police sting topples 'Ghost' criminal messaging app DW 09/18/2024

International police collaboration led to dismantling a criminal-focused encrypted platform, 'Ghost', resulting in significant arrests and prevention of violent crimes.

Chinese Hackers Use Quantum Computer to Break Military Grade Encryption

Chinese researchers claim to have made advancements in quantum computing that could threaten current encryption standards.
The use of a D-Wave quantum computer showcases the potential risk against military-grade encryption protocols.

Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers

End-to-end encrypted cloud storage platforms have critical vulnerabilities that can lead to data leaks.

How Should Bitcoiners View Quantum Computing?

Quantum computing may threaten Bitcoin's security by breaking SHA-256 cryptography, impacting its value significantly.

Chinese researchers break RSA encryption with a quantum computer

Chinese researchers can crack classic encryption using D-Wave's quantum technology, increasing concerns over the security of cryptographic systems.
This development could shorten the timeline of when quantum computers threaten common encryption methods.

A lab in the US unveils new tools to withstand encryption-breaking quantum

The introduction of new encryption algorithms aims to protect against future quantum computing cybersecurity threats.
morecybersecurity

Modern Hashing With Go: A Guide | HackerNoon

Go provides two main types of hash functions: non-cryptographic for speed and cryptographic for security.
#security

Advancing Bitcoin Security: The Journey from Basic Wallets to Advanced Protocols

Bitcoin's security strategies have evolved significantly, addressing increasing threats and incorporating advanced technologies to protect transactions and user assets.

Will Quantum Computers Upend Cryptography as We Know It?

Quantum computing poses a threat to current cryptographic methods.
Public-key cryptography is vulnerable to attacks from quantum computers.

Google says its breakthrough quantum chip can't break modern cryptography

Google's Willow chip is not ready to break current encryption systems and is still years away from threatening cryptography.

Book Review: Cryptography Is as Much an Art as a Science

The course on cryptography combines the techniques of keeping secrets with the art of code-breaking.

Building Robust Digital Asset Custody Solutions: Key Considerations

Private blockchains enhance security and traceability, making them vital for protecting digital assets.

5 Open-source and Free Operating Systems to Donate via Kivach | HackerNoon

OpenBSD offers a secure, free OS solution with an emphasis on security, correctness, and cryptographic integrations for desktop and server environments.

Advancing Bitcoin Security: The Journey from Basic Wallets to Advanced Protocols

Bitcoin's security strategies have evolved significantly, addressing increasing threats and incorporating advanced technologies to protect transactions and user assets.

Will Quantum Computers Upend Cryptography as We Know It?

Quantum computing poses a threat to current cryptographic methods.
Public-key cryptography is vulnerable to attacks from quantum computers.

Google says its breakthrough quantum chip can't break modern cryptography

Google's Willow chip is not ready to break current encryption systems and is still years away from threatening cryptography.

Book Review: Cryptography Is as Much an Art as a Science

The course on cryptography combines the techniques of keeping secrets with the art of code-breaking.

Building Robust Digital Asset Custody Solutions: Key Considerations

Private blockchains enhance security and traceability, making them vital for protecting digital assets.

5 Open-source and Free Operating Systems to Donate via Kivach | HackerNoon

OpenBSD offers a secure, free OS solution with an emphasis on security, correctness, and cryptographic integrations for desktop and server environments.
moresecurity
#blockchain

Holonym Foundation Raises $5.5 Million To Provide Global Digital Personhood With Human Keys | HackerNoon

Holonym Foundation has secured $5.5 million for developing digital identity solutions that enhance user control and privacy on the decentralized web.

Safegcd's Implementation Formally Verified

The safegcd algorithm enhances the security of Bitcoin's libsecp256k1 library through efficient modular inversion.

Bitcoin's Programmability Draws Closer to Reality as Robin Linus Delivers 'BitVM2'

BitVM2 enhances Bitcoin's programmability and security, allowing broader transaction verification through advanced cryptography and a permissionless model.

How Fabric plans to make advanced cryptography ubiquitous | TechCrunch

Fabric Cryptography aims to make advanced cryptographic methods more accessible, enhancing privacy and trust in the digital age.

How Binius Reduces Computational Complexity with Towers of Binary Fields | HackerNoon

Reducing bit width in blockchain computation enhances efficiency, as seen with the Binius project based on Binary Fields.

The Building Blocks of Secure Cross-Chain Options" | HackerNoon

Blockchain technology enhances transaction security and efficiency through decentralized record keeping and smart contracts.

Holonym Foundation Raises $5.5 Million To Provide Global Digital Personhood With Human Keys | HackerNoon

Holonym Foundation has secured $5.5 million for developing digital identity solutions that enhance user control and privacy on the decentralized web.

Safegcd's Implementation Formally Verified

The safegcd algorithm enhances the security of Bitcoin's libsecp256k1 library through efficient modular inversion.

Bitcoin's Programmability Draws Closer to Reality as Robin Linus Delivers 'BitVM2'

BitVM2 enhances Bitcoin's programmability and security, allowing broader transaction verification through advanced cryptography and a permissionless model.

How Fabric plans to make advanced cryptography ubiquitous | TechCrunch

Fabric Cryptography aims to make advanced cryptographic methods more accessible, enhancing privacy and trust in the digital age.

How Binius Reduces Computational Complexity with Towers of Binary Fields | HackerNoon

Reducing bit width in blockchain computation enhances efficiency, as seen with the Binius project based on Binary Fields.

The Building Blocks of Secure Cross-Chain Options" | HackerNoon

Blockchain technology enhances transaction security and efficiency through decentralized record keeping and smart contracts.
moreblockchain

New Course: Secure Python Web Application Development

The course provides hands-on training in Full Stack Security with a focus on secure Python web application development and practical security tools.
#bitcoin

Remembering Hal Finney: A Decade Since His Passing, His Legacy in Bitcoin Lives On

Hal Finney's contributions to Bitcoin and cryptography were transformative, showcasing his resilience and passion even while battling ALS.

Early Bitcoin Developer Backs Satoshi Nakamoto Theory

Jeff Garzik shares insights on his collaboration with Bitcoin's creator, shedding light on Satoshi's coding style and unique approach to problem-solving.

Cypherpunks Write Code: David Chaum & Ecash | HackerNoon

David Chaum pioneered online privacy technology and invented digital cash, earning recognition as an honorary cypherpunk and influencing the foundation of Bitcoin.

A Last Resort: Un'FE'd Covenants For Bitcoin

Jeremy Rubin's proposal offers a soft fork-free solution for Bitcoin covenants, using oracles and BitVM bonds to create a new security model.

The Whitepaper: The Simplest Ideas Are The Most Profound

The Bitcoin whitepaper, though lacking in detail, introduced key concepts that differentiated Bitcoin from previous digital cash systems.

Remembering Hal Finney: A Decade Since His Passing, His Legacy in Bitcoin Lives On

Hal Finney's contributions to Bitcoin and cryptography were transformative, showcasing his resilience and passion even while battling ALS.

Early Bitcoin Developer Backs Satoshi Nakamoto Theory

Jeff Garzik shares insights on his collaboration with Bitcoin's creator, shedding light on Satoshi's coding style and unique approach to problem-solving.

Cypherpunks Write Code: David Chaum & Ecash | HackerNoon

David Chaum pioneered online privacy technology and invented digital cash, earning recognition as an honorary cypherpunk and influencing the foundation of Bitcoin.

A Last Resort: Un'FE'd Covenants For Bitcoin

Jeremy Rubin's proposal offers a soft fork-free solution for Bitcoin covenants, using oracles and BitVM bonds to create a new security model.

The Whitepaper: The Simplest Ideas Are The Most Profound

The Bitcoin whitepaper, though lacking in detail, introduced key concepts that differentiated Bitcoin from previous digital cash systems.
morebitcoin

The 6 secret codes that remain unsolved - can you crack them?

Some historic codes have defied resolution despite advancements in cryptography.
Cracking historical puzzles could potentially solve crimes or uncover treasures.
#quantum-computing

Java app security would get a boost through quantum resistance

Java application security will improve with JDK proposals using quantum-resistant algorithms.
Two proposals outline digital signatures and key encapsulation mechanisms against quantum computing threats.

The sad, bizarre tale of hype fanning fears modern cryptography was slain

The discussion around post-quantum cryptography has been fueled by misinformation and alarmist claims about the state of RSA encryption.

HSBC tests post-quantum VPN tunnel for digital ledgers | Computer Weekly

HSBC launches quantum-secure gold tokens to protect against quantum computing threats, enhancing financial security and interoperability for customers.

Java proposals would boost resistance to quantum computing attacks

Quantum computing advancements pose a serious threat to current information security, necessitating the urgent shift to quantum-resistant algorithms.

Securemetric and Post-Quantum Readiness with EJBCA

Quantum computing poses a threat to current cryptographic techniques, pushing the need for post-quantum security solutions like EJBCA.

Apple readies iMessage for when quantum computers could break encryption | TechCrunch

Apple upgrades iMessage security to post-quantum cryptography in response to future quantum computing threats.
The new encryption protocol combines Elliptic-Curve cryptography with post-quantum cryptography for enhanced security.

Java app security would get a boost through quantum resistance

Java application security will improve with JDK proposals using quantum-resistant algorithms.
Two proposals outline digital signatures and key encapsulation mechanisms against quantum computing threats.

The sad, bizarre tale of hype fanning fears modern cryptography was slain

The discussion around post-quantum cryptography has been fueled by misinformation and alarmist claims about the state of RSA encryption.

HSBC tests post-quantum VPN tunnel for digital ledgers | Computer Weekly

HSBC launches quantum-secure gold tokens to protect against quantum computing threats, enhancing financial security and interoperability for customers.

Java proposals would boost resistance to quantum computing attacks

Quantum computing advancements pose a serious threat to current information security, necessitating the urgent shift to quantum-resistant algorithms.

Securemetric and Post-Quantum Readiness with EJBCA

Quantum computing poses a threat to current cryptographic techniques, pushing the need for post-quantum security solutions like EJBCA.

Apple readies iMessage for when quantum computers could break encryption | TechCrunch

Apple upgrades iMessage security to post-quantum cryptography in response to future quantum computing threats.
The new encryption protocol combines Elliptic-Curve cryptography with post-quantum cryptography for enhanced security.
morequantum-computing

OpenJDK News Roundup: Compact Object Headers, Synch Virtual Threads, Disable Security Manager

OpenJDK is evolving with significant changes targeting JDK 24, including the removal of outdated features to enhance performance and security.
#zero-knowledge-proofs

Enhancing Security and Privacy on the Bitcoin Network with Zero-Knowledge Proofs | HackerNoon

Zero-knowledge proofs enhance privacy and security in cryptocurrencies by allowing transaction verification without disclosing sensitive information.

Buenos Aires Adds ZK Proofs to City App in Bid to Boost Residents' Privacy

Buenos Aires integrates zero-knowledge proofs into its app to enhance privacy for residents, allowing them to validate information without disclosing personal data.

Enhancing Security and Privacy on the Bitcoin Network with Zero-Knowledge Proofs | HackerNoon

Zero-knowledge proofs enhance privacy and security in cryptocurrencies by allowing transaction verification without disclosing sensitive information.

Buenos Aires Adds ZK Proofs to City App in Bid to Boost Residents' Privacy

Buenos Aires integrates zero-knowledge proofs into its app to enhance privacy for residents, allowing them to validate information without disclosing personal data.
morezero-knowledge-proofs

You Can Now See the Code That Helped End Apartheid

John Graham-Cumming decrypted a file that played a crucial role in South Africa's anti-apartheid history, highlighting tech's intersection with activism.

SHINOBI: Stop Demonizing Developers Over Nonsense

The BIP 85 update poses a risk of losing access to funds due to changes in child key generation that conflict with old backups.

EOS Network significantly Upgrades With 1-Second Transaction Finality | HackerNoon

EOS Network successfully upgraded to Spring 1.0, introducing the Savanna consensus algorithm, resulting in unprecedented 1-second transaction finality.
#ai

Gartner: The Top 10 Strategic Technology Trends For 2025

Rapid advancements in AI and computing are crucial for future IT strategies.
C-level executives should focus on technologies likely to disrupt industries by 2025.
Agentic AI will evolve to make autonomous decisions for users.

Allison Duettmann: How Blockchains Can Make AI Safer

Allison Duettmann, CEO of Foresight Institute, delves into the potential of nanotechnology, space exploration, and cryptography in shaping the future of AI and technology.

Gartner: The Top 10 Strategic Technology Trends For 2025

Rapid advancements in AI and computing are crucial for future IT strategies.
C-level executives should focus on technologies likely to disrupt industries by 2025.
Agentic AI will evolve to make autonomous decisions for users.

Allison Duettmann: How Blockchains Can Make AI Safer

Allison Duettmann, CEO of Foresight Institute, delves into the potential of nanotechnology, space exploration, and cryptography in shaping the future of AI and technology.
moreai
from Ars Technica
4 months ago

New multispectral analysis of Voynich manuscript reveals hidden details

The Voynich manuscript is likely a genuine medieval document rather than a forgery, with new findings suggesting early attempts to decode its script.

YubiKey vulnerability will let attackers clone the authentication device

NinjaLab has revealed a vulnerability in YubiKey 5 Series that enables cloning of the devices, posing risks mainly to sensitive users.

Seriously, Use Encrypted Messaging

Encrypted messaging provides privacy for users, but also facilitates potential criminal activities.

How Decentralized AI and Zero-Knowledge Proofs Will Democratize Compute

Open-source AI development is essential for fostering innovation and accessibility.
Decentralized AI distributes processes to enhance censorship resistance and collaboration.
Challenges in security and performance must be addressed for decentralized AI to succeed.

Fabric, Startup Building 'VPU' Chips for Cryptography, Raises $33M

Fabric Cryptography raised $33 million to develop custom silicon chips for cryptographic applications, enhancing efficiency for AI and blockchain tasks.

Educational Byte: Cryptography and Its Connection to Cryptocurrencies | HackerNoon

Cryptography evolved from secret writing to securing digital information, essential for personal privacy and online security today.

Jack Dorsey Predicts Over $1 million Bitcoin Price by 2030

Block CEO Jack Dorsey predicts Bitcoin at least $1 million by 2030.

5 New Mysteries and Thrillers for Your Nightstand This Spring

Books covering murder, cryptography, and missing-person cases.
First-person narration and mysterious family dynamics in the novels create intriguing storylines.

Obituary: Professor Ross Anderson, pioneer in security engineering and campaigner | Computer Weekly

Ross Anderson was a prominent figure in security engineering and digital rights advocacy.
Anderson's contributions included groundbreaking work in security economics and cryptography, as well as activism against insecure algorithms.

Silence Laboratories, a cryptographic security startup, secures funding | TechCrunch

Silence Laboratories raised $4.1 million funding round led by Pi Ventures and Kira Studio.
Silence uses MPC to enable secure collaboration while keeping sensitive information private.
[ Load more ]