29 May 2018
We tried out and described a few approaches to reducing the size of Docker images for the components of our database encryption proxy Acra. As a result, we found a way to reduce the container size by roughly 62 times.
21 Sep 2016
Second article in series, Key Management 101 will talk about basic key management concepts, goals and methods to achieve them.
15 Aug 2016
In upcoming series of articles, we'll ascend from classic database security techniques to modern technologies, including some of the cutting edge research and our own experiments in the field.
23 May 2016
This blog post features infographic on how to choose cryptographic frameworks when developing Android apps and adds a few notes about Native/Java crypto.
17 Mar 2016
While doing some protocol design for front-end clients with WebThemis services, we wanted to try it in real-world situations first: how easily could we deploy complicated cryptographic behavior into web apps? Turns out, quite easily. This post describes one of such web apps, designed to illustrate some zero-server-trust design patterns we're using in other developments.