Is it possible to securely use a remote service in a completely hostile network environment

A worldbuilding technical question!
I am an extremely evil power-mongering country government. There is a company S under my jurisdiction, physically located completely inside the borders. This company provides services worldwide, includin… Continue reading Is it possible to securely use a remote service in a completely hostile network environment

cryptography – BitBox02 firmware signed & public key attached to firmware image for verification

Bootloader of the BitBox02 crypto wallet verifies the main application with the public keys that are attached to the firmware update itself. Next to that, there are signatures of the public keys, signed by the company’s private key.

Devic… Continue reading cryptography – BitBox02 firmware signed & public key attached to firmware image for verification

Encrypting/wrapping a private RSA key in PKCS8 using AES-GCM and openSSL 3.20 (library not command line tool)

I need to protect a private RSA key using a passphrase but using AES-GCM for the actual encryption.
This is normally done using various a combination of openSSL library calls. However, I now need to support using AES-GCM instead of AES-CBC… Continue reading Encrypting/wrapping a private RSA key in PKCS8 using AES-GCM and openSSL 3.20 (library not command line tool)

Does self-signed encryption certificate violate "no multi-use keys" principle?

Say that I have generated an RSA keypair, which I intend to publish only for use with RSA-KEM; I can see that this is provisioned for:

The intended application for the key MAY be indicated in the key usage certificate extension (see RFC 5… Continue reading Does self-signed encryption certificate violate "no multi-use keys" principle?

Over-Optimizing Security? Storing Encrypted Data on a Server While Private Key Remains With User

Assume that I have a server storing sensitive user information (think medical records). I want this data to be encrypted on my server at almost all times. Only when a doctor needs to access the data of a particular person, it should be dec… Continue reading Over-Optimizing Security? Storing Encrypted Data on a Server While Private Key Remains With User

Microsoft Improves Windows Security with a Path to Move Off NTLM

It’s time to stop relying on the insecure authentication protocol built into Windows. Microsoft is making it easier to switch to secure modern options. Continue reading Microsoft Improves Windows Security with a Path to Move Off NTLM