Will VPNs Continue Losing the Battle to Keep Data Secure? 

Virtual private networks (VPNs) are under attack and hackers may be winning the battle, using exploits that are becoming all-too-common. While many may argue that VPNs are salvageable and can be returned to their once-lofty status of protecting data, … Continue reading Will VPNs Continue Losing the Battle to Keep Data Secure? 

Creating X509 certificate in C using post-quantum public key algorithm?

I’m trying to implement a self signed x509 certificate that uses a post-quantum (PQ) public key algorithm as the public key algorithm. I looked at the openssl library in c, and the way it’s done using RSA. I’m essentially try… Continue reading Creating X509 certificate in C using post-quantum public key algorithm?

2020: Machine Learning, Post Quantum Crypto & Zero Trust

Welcome to a digital identity project in 2020! You’ll be expected to have a plan for post-quantum cryptography.  Your network will be littered with “zero trust” buzz words, that will make you suspect everyone, everything and every transaction.&#16… Continue reading 2020: Machine Learning, Post Quantum Crypto & Zero Trust

How safe is this "Multidimensional-Encryption method" (includes xAES, familiar from Unseen.is)?

I would like to ask about this encryption
method that I found: USPTO patent and it is related to this question here: A service that claims beyond army level encryption and Unseen.is encryption claims revisited with their prop… Continue reading How safe is this "Multidimensional-Encryption method" (includes xAES, familiar from Unseen.is)?