Analysing gossip mechanisms with PRISM by Michael Oxford Billions of internet connections rely on the use of public cryptographic keys to encrypt data. While this is necessary for safe browsing it is certainly not sufficient. In particular, how can I be confident that the public key I am using for a website does belong to … Continue reading “Combating phishing attacks”