Guardian, FT, etc. share their internet encryption keys with many

We have all heard about hackers stealing huge user databases with passwords as they are tempting bounties. FT, Guardian and many others create a new kind of reward – their internet encryption keys via CDNs – services speeding up web traffic.

Continue reading Guardian, FT, etc. share their internet encryption keys with many

SSL testing – servers or domains?

We have started testing our SSL certificate spot checks – KeyChest – and realized that we were conceptually different from SSL Labs. We focus on the server rather than the domain name and it makes a difference.

Continue reading SSL testing – servers or domains?

First BlackHat, now DEFCON: We talk “Trojan-tolerant hardware security in practice”

I have mentioned this multi-party encryption project of ours (Enigma Bridge) and University College London here earlier. If you’re planning to go to BlackHat US or DEFCON-25, come and see our talks about practical “ultra-secure” multi-party encryption for the cloud and some of the technology enabling it (Unchaining the JavaCard Ecosystem).

Continue reading First BlackHat, now DEFCON: We talk “Trojan-tolerant hardware security in practice”

Is cloud security all about emotional marketing?

I still find it interesting that when I mention “hardware security” to someone, my “pitch” is over, done, finished. Like if no-one realized that every cloud needs physical servers to run on. Everything cloud is marketed as “secure”, but are we really in control of our data?

Continue reading Is cloud security all about emotional marketing?

KeyChest – FREE plan and track for 100% HTTPS uptime

We have been using Letsencrypt certificates for a year now. As it is free, we have been constantly increasing the number of services using it. I personally like the three months validity as it makes renewals a “business as usual” task, rather than incidents. But it doesn’t happen through magic.

Continue reading KeyChest – FREE plan and track for 100% HTTPS uptime

DEFCON web certificate expires – what’s going on?

I just wanted to check whether the Agenda has been updated … well, I guess it wasn’t. defcon.org uses HSTS so it’s pretty tricky to access the web even with a “red bar”.

Continue reading DEFCON web certificate expires – what’s going on?

WannaCry – A Stop of A Never-Ending Journey

Ok, everyone seems to be writing about it so here’s my take so far. A professional code of malware extended in a pretty silly way that somehow got into computers of companies. And hackers collected well below $100,000.

Continue reading WannaCry – A Stop of A Never-Ending Journey

Do you have screenshots of your crypto platform?

We basically gave up on going to startup events for now. I know It’s not good for marketing or when you look for equity investment. We just got tired of trying to explain what a “platform” is good for. Everyone expects a flashy demo or screenshot of your app.

Continue reading Do you have screenshots of your crypto platform?

Does Amazon Want To Control All Encryption Keys?

Public cloud providers have absolute control over our data, applications, everything we do on their cloud platform. Independent key management lowers users’ risk exposure and as such is in the interest of cloud providers. Well, Amazon AWS has different thoughts.

Continue reading Does Amazon Want To Control All Encryption Keys?

VPN for Companies – “Bring Your Own Device” Made Easy

We pushed hard to extend our Private Spaces and make them a great choice for companies to connect roaming users (and their own devices, while providing a high-level of security for BYOD policies).

Continue reading VPN for Companies – “Bring Your Own Device” Made Easy