Introducing the Tozny Encrypted One Time Secret Sharing App. It encrypts a secret in your browser, gives you a link to share it (with an optional password), and decrypts it in the browser of whoever … Read More
Privacy Fines for Marriott – Can End-to-End Encryption Help?
Regulators hit Marriott and British Airways with massive privacy fines. This is related to the relatively new privacy law known as GDPR, which requires increased security. You might be asking yourself, “What kind of security … Read More
Cryptographic Access Control for True Policy Enforcement
Most of the systems we use today have some type of access control. This is enforced by software products based on a set of rules or policy, but increasingly, organizations are using cryptographic access control … Read More
Can I Use Intel’s SGX for Secure Computation in the Cloud Yet?
With so much emphasis on secure computation we thought it might be useful to take a look at the state of SGX availability across some popular providers. In case you’re not familiar with SGX this … Read More
Encryption Core Concepts: Adding Crypto to your System
Are you developing an application that you think would benefit from encryption? Do you know it will save money in a data breach, but don’t know where to go from there? Encryption core concepts are … Read More