Cryptographic Computing

Now That’s Cryptographic Computing Power

It was recently discovered that more than one business were surreptitiously using computing power of visitors to their web sites to mine bitcoins. Maybe they did this as an alternative way of paying for their costs instead of using advertising. Maybe they did this for other reasons. But this should ... Read More
GDPR compliance in legacy environments

GDPR compliance in legacy environments

The General Data Protection Regulation (GDPR) that takes effect next May will require businesses to protect the privacy of any personal data that they manage. There are many ways to do this, but the GDPR strongly encourages the use of pseudonymization, which, depending on how the business currently manages the ... Read More
Are you accidentally paying for BitCoins?

Are you accidentally paying for BitCoins?

It was recently discovered that more than one business were surreptitiously using computing power of visitors to their web sites to mine bitcoins. Maybe they did this as an alternative way of paying for their costs instead of using advertising. Maybe they did this for other reasons. But this should ... Read More
Blockchain

Definitions Matter when talking about Blockchain

There is lots of talk of bitcoin and blockchain in the news these days. It’s clear what bitcoin is, but the precise definition of a blockchain is more than a bit more elusive. Definitions matter. In thermodynamics, you have a reasonable definition for temperature. But with that definition, it turns ... Read More
The Real Vlaue of BitCoin

The Real Value of Bitcoin

The recent dramatic increase in the price of Bitcoin has encouraged lots of people to give us their estimates for what the price of Bitcoin really ought to be. These vary by so much that it’s almost worth treating them like engineers handle values that can vary by many orders ... Read More
The State of PCI Compliance, 2017

The State of PCI Compliance, 2017

Complying with the Payment Card Industry Data Security Standard (PCI DSS) can be hard. Businesses have been working on doing so for over 13 years, since PCI DSS Version 1.0 was released on December 15, 2004. In fact, it’s so hard that a significant fraction of businesses are still not ... Read More
Cryptography

The High/low Entropy Rant for Cryptography

We had another discussion of entropy today. In computing, entropy is the randomness collected by an operating system or application for use in cryptography or other uses that require random data, a quick search of Wikipedia will tell you. And you may well know, a lack of entropy can have ... Read More
Quantum Computers

Quantum computers breaking encryption? Don’t panic!

If clever engineers somehow figure out how to build large-scale quantum computers, it would make some, but not all, known public-key encryption algorithms essentially useless. But there are already public-key encryption algorithms that are known, even ones that have been through reputable standards processes, that will still be secure if ... Read More
bitcoin blockchain

Blockchain Versus the GDPR

The EU’s General Data Protection Regulation (GDPR) takes effect on May 25, 2018. It will require all businesses that process EU citizens’ personal data to take lots of measures to protect their privacy. The GDPR also provides EU citizens with a right to erasure: to be able to require that ... Read More
Quatum Computing

Quantum Computing? Really?

We just had an interesting discussion here about quantum computing, quantum cryptography and post-quantum cryptographic algorithms. I’m afraid that I might have wasted a few people’s time with a rant about why I’m not impressed by the possibilities for quantum computing. I started by noting my thoughts on how hard ... Read More
Loading...