-
Strong Ciphers, Weak Assumptions
The best laid plans of mice and men… A lot of attention has been paid to the design and implementation of messaging apps. Signal usually comes out as being considered the most trustworthy of the bunch by people who worry about detail, but there are other apps with real end-to-end encryption too. Of course, subverting…
-
How will Quantum Vulnerable Encryption (QVE) unravel?
I’ve written a little recently (and less recently!) about Post Quantum Encryption and how action is needed NOW. How the timeline of QVE’s unravelling and collapse will take place is almost impossible to say. But we might usefully draw some lessons from the collapse in confidence of the MD5 hashing algorithm. Let’s look at the…
-
[***NOT REDACTED***]
Or “Redaction Failures”. There have been many high-profile redaction failures over the years[1]. So it may help to briefly classify[2] them into some different types. Context & Inference That last category is rarely talked about. After all, techies love technical failures or clever technical workarounds. Context & Inference is terribly boring in comparison – but…
