Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!
I started watching the second session of the Bootcamp with 0xMilica, and as she predicted, my mind...
If you're diving into secure communications, you've likely heard terms like encryption, hashing,...
Introduction In this article, I’ll walk you through my implementation of the Secure Remote...
Every website deals with the same problem: bots crawling your site, and absolutely no reliable way to...
Cryptography security in 60 seconds. 24 rules for weak algorithms, random generation, and key management.
Welcome back to the Confidential Computing Chronicles. In Part 4, we learned how to prove our...
In my previous post, I wrote about finite fields (Galois fields) of order 2n, abbreviated GF(2n)....
Week 1: Finite Field Elements: the math quietly powering blockchains A few weeks ago, I...
Envelope encryption is a technique that uses two layers of encryption to protect sensitive data. The...
GHASH is the hash function that GCM uses to compute authentication tags. It is defined in NIST's GCM...
How I built TimeSeal using split-key cryptography, edge computing, and zero-trust architecture to create mathematically unbreakable time locks
How Articles 12, 15, and 73 create implicit pressure for tamper-evident audit trails in high-risk AI...
The SEC's 2022 amendments to Rule 17a-4 introduced an "audit-trail alternative" to traditional WORM...
The global financial system has crossed a threshold. For the first time in history, algorithms—not...
AES is a symmetric-key encryption algorithm that is considered extremely secure, very easy to...
Proving System Integrity with GPG Signatures and Cryptographic Verification of AIDE Baselines and Reports
From the first whispered secret you tried to pass in school to the last password you sent over a chat...
NIST finalized post-quantum standards in 2024. Here's how to pick the right algorithm for your stack and why hybrid mode isn't optional.
A02: Cryptographic Failures Being a full stack developer, I try my best to make my web...
RSA stands for Rivest Shamir Adleman, and it was invented by: Ron Rivest Adi Shamir Leonard...
The EU AI Act (Regulation 2024/1689) requires high-risk AI systems to maintain automatic logging...
🔐 The Invisible Backbone of the Digital World I’d dare to say that cryptography is the backbone of...
In 2025, privacy-first communication is no longer a luxury — it’s a necessity. Decentralized,...
¡Esa es una idea fantástica para un artículo! El concepto de que el mensaje es la diferencia entre...
As developers, we are obsessed with code quality. We run linters, we do static analysis, and we patch...
A common criticism of blockchain-based audit systems: "You can't have immutable logs AND GDPR...
When AI art collides with military-grade encryption, you don’t just build an app — you summon a...
Quantum Illusions: Can We Really Trust Our Entanglement Tests? Imagine building a...
Today, I'm excited to announce the public release of securebit_core — a pure Rust cryptographic...
Bracing for Breakers: Quantum-Safe Crypto for the Real World Imagine all your HTTPS...