Cryptosmith Video Series

The Cryptosmith video series uses animation to explain well-known crypto techniques. This should help more people understand crypto technology. This is particularly important as people rely more and more on mobile and Internet security mechanisms. Aside from protecting online commerce and financial activities, many professionals are realizing that their daily activities require strong protection. [UPDATE:... Continue Reading →

Election Crypto Conspiracy Theory

I'm not often a fan of conspiracy theories, except for entertainment value. This one is interesting because it combines international intrigue, the elections, and our world of notoriously poor email security. The conspiracy arises from foreigners trying to influence the United States election. They spy on unprotected emails and leak the contents to influence US... Continue Reading →

A Yank at Bletchley Park

A friend and colleague introduced me to a 94-year-old gentleman with a rare tale to tell. John McCallister was recruited during World War II to be a US Army liaison officer at "Station X," the UK's highly secret codebreaking operation at Bletchley Park. Station X collected intercepted German radio messages, all encrypted with the supposedly-unbreakable Enigma cipher,... Continue Reading →

Symantec Breaks Trust with the Internet?

Symantec is one of the companies that holds the keys to the Internet: they are a trusted certificate authority for authenticating major web sites. All major browsers recognize Symantec as a trustworthy source of SSL/TLS authentication certificates. Symantec (also known by its subsidiary name Verisign) is part of a chain of trust that keeps our Internet traffic safe.... Continue Reading →

NSA re-releases Boak’s Lectures

I'm a fan of Boak's Lectures - they cover the fundamentals of military cryptography just before the information revolution.David Boak developed the lectures for the National Security Agency's Cryptologic School. Even though the lectures are from the '60s and '70s, they remain relevant to today's cybersecurity threats. Cryptographic techniques that were classified Secret in Boak's... Continue Reading →

Recycling an iPhone – not a picnic

I'm upgrading my iPhone and trading in the old one. I had to erase the old one completely and unhook "Find my iPhone" from it. I'd seen headlines hinting that recycled iPhones aren't often erased. Some headlines suggest that the erasing operation itself doesn't really work. It works. It's just time consuming. I turned off TouchID and... Continue Reading →

Encrypt All Hard Drives!

If you have the technical interest to read this, you probably do a lot of your finances with your personal computer. Taxes, monthly budgets, check printing (on those rare occasions), and tracking numerous accounts - computers are far better than people at handling such details. A typical personal computer, or smart phone for that matter, contains company names,... Continue Reading →

Create a website or blog at WordPress.com

Up ↑