Re: Investigating the Origins of RSA Public Keys

This post is about a research done by one of our co-founders. Petr showed that it is possible to find which tool or hardware device generated RSA keys from just a few public keys. I’m thinking it’s an attack, unexpected data leakage channel, but also an excellent source for audit-related analytics.

Continue reading Re: Investigating the Origins of RSA Public Keys

“Progress and research in cybersecurity” by The Royal Society

“Encryption is a key technology that underpins trustworthy computing. As digital technologies become ever more central to our lives, encryption becomes more important, and any weaknesses in its implementation become greater risks. Governments must commit to preserving the robustness of end- to-end encryption, and promoting its widespread use.”

Continue reading “Progress and research in cybersecurity” by The Royal Society

How we screwed-up ProductHunt launch

A month ago, we decided to launch EnigmaLink – our file-sharing application on ProductHunt. Neither of us used ProductHunt before, but I found a friend who could do the submission. I thought it would be straightforward.

Continue reading How we screwed-up ProductHunt launch

Hacking WiFi passwords – a randomness problem

Dusan, one of us @EnigmaBridge was curious about how are default WiFi router passwords generated and very quickly came up with an algorithm producing right passwords. And this “bootstrapping” problem is much bigger …

Continue reading Hacking WiFi passwords – a randomness problem

“We created a cloud security platform.” – “so what?”

We have been working on a cloud security platform Enigma Bridge for the last couple of years. It was a great fun  and … we built it. However, when we started talking to potential customers, we often had a hard time. We heard it was really interesting but what did it actually do?

Continue reading “We created a cloud security platform.” – “so what?”

Software Reliability

It seems I have to deal with a question of who to trust – our new product or an established software package – way too often. Answers make me question what is the level of testing in open-source software and what is the reliability of software in general. Continue reading Software Reliability

A Long Dark Tea-Time of The Soul

You may know the mood when all seems to be done but new tiny issues keep cropping up every day … until they eventually disappear without you realizing it. The title has kind of sprung to my mind.

A lot has happened since my previous post and I indeed lived and breathed Enigma Bridge.  While we kept focussing on a particular market segment we decided to make our products easier to test by smaller companies – a new test/staging instance of Enigma Bridge service will be launched within days. We did a good progress business-wise as well. But one thing I want to mention in particular is an ASIRTA tool – a baseline profiler for data governance. Continue reading A Long Dark Tea-Time of The Soul