20 Jul 2016
Lighter reading: general thoughts on how the familiar mindset of 'protect the perimeter' changed over time.
23 May 2016
This blog post features infographic on how to choose cryptographic frameworks when developing Android apps and adds a few notes about Native/Java crypto.
30 Mar 2016
This blog post features infographic on how to choose crypto when developing iOS apps. It's always useful to put tool choice in context of causes (goals) and effects. This is what we've tried to do in this post.
3 Mar 2016
Threats you may face when implementing cryptography within your web application JS way.
26 Nov 2015
Current technological advancements in authenticating users seems to be sufficient for most cases. However, taking a more detailed look reveals weaknesses and tradeoffs in all existing authentication schemes. Before explaining the methodology and cryptography behind Secure Comparator, our authentication protocol, we wanted to outline reasons for developing it in a brief review of existing authentication methods.