What standardized schemes exist for representing binary data in a human-readable manner?

Occasionally (in cryptography and elsewhere), the need arises to represent arbitrary binary data (such as hashes or private keys) in a way that humans can process/memorize more easily than for example hexdumps.

I am aware of three such sc… Continue reading What standardized schemes exist for representing binary data in a human-readable manner?

SIM Hijacking

SIM hijacking — or SIM swapping — is an attack where a fraudster contacts your cell phone provider and convinces them to switch your account to a phone that they control. Since your smartphone often serves as a security measure or backup verification… Continue reading SIM Hijacking

SIM Hijacking

SIM hijacking — or SIM swapping — is an attack where a fraudster contacts your cell phone provider and convinces them to switch your account to a phone that they control. Since your smartphone often serves as a security measure or backup verification system, this allows the fraudster to take over other accounts of yours. Sometimes this involves people inside… Continue reading SIM Hijacking

Signal Tests Upgraded Cryptography for Groups Function

Signal, the encrypted messaging platform, is planning to launch an upgraded secure group messaging and communities function. Signal’s groups are private, meaning that the service itself doesn’t keep a record of a user’s group membersh… Continue reading Signal Tests Upgraded Cryptography for Groups Function

The usability drawback of using biometrics for device authentication but not for device decryption after reboot?

What if your device gets locked down for a long while because you cannot remember the password? Well, that used to be a rare case.. because people used to use their device’s passwords to access them frequently and the chances… Continue reading The usability drawback of using biometrics for device authentication but not for device decryption after reboot?

NAC: Usability and Security for Users

Using NAC, organizations no longer have to choose between security or usability on their networks It’s easy to assume that making something more secure automatically makes it more difficult to use. After all, if you add a lock to a door, that’s one mo… Continue reading NAC: Usability and Security for Users