Blog posts exploring the concept "Cryptography"
← Back to all tagsBlog posts exploring the concept "Cryptography"
← Back to all tagsThe software industry never stands still. While in most cases this translates to technological advance, it also brings change to safety, security and compliance. What was once considered rare practice in secure software development is rapidly becoming the new “course of doing business”. The EU’s Cyber Resilience Act, which entered force in December 2024, fundamentally transforms how we must think about software integrity. For developers who have never encountered code signing, and even for those who have, the patterns and practices of yesterday are changing.
Read MoreThe world got a wake-up call this week due to Bloomberg’s investigation into how “tiny middlemen” in the SMS routing infrastructure can access two-factor authentication codes. For security professionals, this wasn’t surprising – it was inevitable. What was shocking was the simplicity and low cost of these attacks: for as little as $16, attackers could reroute authentication codes through vulnerable VoIP providers. At SpeakEZ, we’ve been anticipating this reckoning. Our QuantumCredential technology, protected by pending patents (US 63/780,027 and US 63/780,055), represents a fundamental departure from network-dependent authentication.
Read MoreIn 1993, while the tech world marveled at the newly-freed World Wide Web and debated the coming “Information Superhighway,” a Canadian computer consultant published a three-page warning that everyone dismissed as alarmist. Peter de Jager’s “Doomsday 2000” article in Computerworld was largely ignored, until faint realization started turning to full blown panic around 1997-1998, when organizations finally did the math and realized the scope of the problem. Today, while Silicon Valley pours billions into the next ChatGPT competitor, an equally predictable catastrophe approaches with mathematical certainty.
Read MoreIn the world of cryptography, a storm is brewing. Quantum computing, once a theoretical curiosity, has been steadily advancing toward practical reality. When sufficiently powerful quantum computers arrive, not if, but when, they will fundamentally alter the cryptographic landscape. The implications for secure communications are profound and far-reaching. The most immediate concern is what security researchers call the “harvest now, decrypt later” attack vector. Nation-states and sophisticated actors are already collecting and archiving encrypted internet traffic with the explicit intention of decrypting it once quantum computers become sufficiently powerful.
Read MoreLast year, we explored how F#’s type system could transform threshold signature security through FROST. Today, we’re tackling an even more challenging problem: the conspicuous absence of end-to-end encryption in group messaging. While Signal has admirably protected one-to-one conversations for years, their group chat implementation remains a study in compromise. Telegram simply gave up, offering no end-to-end encryption for groups at all. The reasons aren’t mysterious. Group encryption faces fundamental mathematical challenges that individual encryption elegantly sidesteps.
Read MoreIn the world of distributed systems, trust is fundamentally a mathematical problem. For decades, organizations have relied on single points of failure: a master key, a root certificate, a privileged administrator. But what if we told you that the mathematics of secure multi-party computation, pioneered by Adi Shamir in 1979 and refined through Schnorr signatures, has reached a point where distributed trust is not just theoretically possible, but practically superior to centralized approaches?
Read More