Encryption is one of the pillars of modern-day communications. You have devices that use encryption all the time, even if you are not aware of it. There are so many applications and systems using it ...
Researchers have found a way to generate GPG key collisions in just four seconds, and put out a call for GPG to harden its UX. Attack and vulnerability details are often disclosed in order to prompt ...
Protect your code commits from malicious changes by GPG-signing them. Often when people talk about GPG, they focus on encryption—GPG's ability to protect a file or message so that only someone who has ...
Last month, in the first of a two-part series, I described the theory behind the next generation in passive authentication technologies called Single Packet Authorization (SPA). This article gets away ...