Explore >> Select a destination


You are here

blog.cryptographyengineering.com
| | www.benthamsgaze.org
5.8 parsecs away

Travel
| | The MIKEY-SAKKE protocol is being promoted by the UK government as a better way to secure phone calls. The reality is that MIKEY-SAKKE is designed to offer minimal security while allowing undetectable mass surveillance, through the introduction a backdoor based around mandatory key-escrow. This weak
| | www.cossacklabs.com
5.7 parsecs away

Travel
| | Designed for securing online accounts, FIDO U2F as a protocol and YubiKey as a hardware tool are not silver bullets. If not used wisely, this powerful combo becomes an attractive target in the hands of skilful attackers.
| | blog.xot.nl
4.3 parsecs away

Travel
| |
| | paragonie.com
26.6 parsecs away

Travel
| A developer's short guide to encryption, authentication, and authenticated encryption with examples in PHP