Combating phishing attacks

Analysing gossip mechanisms with PRISM by Michael Oxford Billions of internet connections rely on the use of public cryptographic keys to encrypt data. While this is necessary for safe browsing it is certainly not sufficient. In particular, how can I be confident that the public key I am using for a website does belong to … Continue reading “Combating phishing attacks”

Published: Posted on

Article 13 and the Great CopyWall of Europe

The evolution of digital technologies has changed the way works and other protected subject-matter are created, produced, distributed and exploited. New uses have emerged as well as new actors and new business models. Thus begins the proposed EU Directive on copyright in the digital single market. So far so good. Then why have over 70 … Continue reading “Article 13 and the Great CopyWall of Europe”

Published: Posted on

Post-quantum cryptography explained

by Christophe Petit Introduction Cryptography is the science and art of ensuring private and authenticated communications. In our highly digital society, we as individuals use it daily to ensure the security of our electronic banking transactions, emails, and of course our countries rely on cryptography for national security purposes. These examples have something in common, … Continue reading “Post-quantum cryptography explained”

Published: Posted on