Last year many users of the encrypting software TrueCrypt was asking only one question: TrueCrypt, secure or insecure?
A group of Ten auditors from the Fraunhofer Institute for Secure Information Technology has conducted a six-month audit of TrueCrypt under contract from the German Government. The researchers have expressed a Continue reading →
The authors of this report are Nader Ammari, Gustaf Björksten, Peter Micek, and Deji Olukotun.
In the age of internet for many users, mobile devices provide the only way of going online. The devices serve as gateways to information, resources, and innovation, but they can also leak intimate details about the Continue reading →
Republican presidential candidate Jeb Bush said Tuesday that encryption makes it harder for law enforcement to track down “evildoers” — and called for a “much better, more cooperative relationship” with Apple, Google, and other tech companies that are building uncrackable Continue reading →
Japanese police have arrested today CEO of MtGox exchange. Mark Karpeles, is being held in connection with the loss of $387m (£247m, €351m) last February. He is suspected of having accessed the exchange’s computer system to Continue reading →
Could an IBM mainframe from the 1960s mine Bitcoin? The idea seemed crazy, so I decided to find out. I implemented the Bitcoin hash algorithm in assembly code for the IBM 1401 and tested it on Continue reading →