blog.toughbyte.com
About Toughbyte Blog
https://blog.toughbyte.com/about
Sign in / Sign up. At the intersection of business and tech. Note from the editor. A blog about building digital services people want, and more. Digital entrepreneur. Helping companies to build software in Russia. Newbie writer, experienced citizen, professional technologist. Founder at Toughbyte: http:/ toughbyte.com. Pocket Full O Kryptonite. We hacked HSMs ( https:/ www.cl.cam.ac.uk/techreports/UCAM-CL-TR-592.pdf. We learnt and built https:/ enigmabridge.com. React, Angular, Go, Scala, Haskell.
lightbluetouchpaper.org
Web security | Light Blue Touchpaper
https://www.lightbluetouchpaper.org/category/web-security
Security Research, Computer Laboratory, University of Cambridge. Category Archives: Web security. USENIX Security Best Paper 2016 – The Million Key Question … Origins of RSA Public Keys. Et al from Masaryk University in Brno. Won the Best Paper Award at this year’s USENIX Security Symposium with their paper classifying public RSA keys according to their source. Is a well-deserved recognition as I’ve worked with. And followed Petr’s activities closely. And other privacy enhancing mailers or operators.
lightbluetouchpaper.org
Security engineering | Light Blue Touchpaper
https://www.lightbluetouchpaper.org/category/security-engineering
Security Research, Computer Laboratory, University of Cambridge. Category Archives: Security engineering. Bad security, good security, case studies, lessons learned. USENIX Security Best Paper 2016 – The Million Key Question … Origins of RSA Public Keys. Et al from Masaryk University in Brno. Won the Best Paper Award at this year’s USENIX Security Symposium with their paper classifying public RSA keys according to their source. Is a well-deserved recognition as I’ve worked with. Follow the link for more).
expert.enigmabridge.com
Enigma Bridge - The Next Generation Cloud Encryption Service
https://expert.enigmabridge.com/test/index.html
Keep Control of Your Cloud. With Simple and Powerful Cloud Encryption Service. You can try our API live from your browser. Call, simplest API call. AES-256, RSA-1024, RSA-2048) demo. User Authentication with HOTP. And Password. HOTP can be used with Google Authenticator. Create a new user. Demo (e.g., password reset, HOTP re-initialization). Through our main website at:. Https:/ www.enigmabridge.com.
SOCIAL ENGAGEMENT