#cryptography

[ follow ]
#security
fromThe Verge
4 months ago
Information security

Google says its breakthrough quantum chip can't break modern cryptography

Google's Willow chip is not ready to break current encryption systems and is still years away from threatening cryptography.
fromHackernoon
1 year ago
Information security

5 Open-source and Free Operating Systems to Donate via Kivach | HackerNoon

OpenBSD offers a secure, free OS solution with an emphasis on security, correctness, and cryptographic integrations for desktop and server environments.
fromOracle
1 day ago
Java

Jipher: Java Cryptographic Service Provider for FIPS Environments

Oracle Jipher enables Java applications to meet FIPS 140-2 requirements with a validated cryptographic module.
fromThe Verge
4 months ago
Information security

Google says its breakthrough quantum chip can't break modern cryptography

Google's Willow chip is not ready to break current encryption systems and is still years away from threatening cryptography.
fromHackernoon
1 year ago
Information security

5 Open-source and Free Operating Systems to Donate via Kivach | HackerNoon

OpenBSD offers a secure, free OS solution with an emphasis on security, correctness, and cryptographic integrations for desktop and server environments.
fromOracle
1 day ago
Java

Jipher: Java Cryptographic Service Provider for FIPS Environments

Oracle Jipher enables Java applications to meet FIPS 140-2 requirements with a validated cryptographic module.
more#security
#bitcoin
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Project Eleven To Award 1 BTC To Tackle Bitcoin's Quantum Vulnerability

Project Eleven launched the Q-Day Prize, offering 1 BTC for breaking ECC cryptography using Shor's algorithm on a quantum computer.
fromBitcoin Magazine
1 week ago
Python

Secp256k1lab: An INSECURE Python Library That Makes Bitcoin Safer

A new Python library 'secp256k1lab' provides a unified standard for Bitcoin Improvement Proposals, simplifying cryptographic implementation and reducing redundancy.
fromwww.scientificamerican.com
2 days ago
Information security

This Cutting-Edge Encryption Originates in Renaissance Art and Math

Renaissance art's perspective laws influenced Western art and led to modern cryptographic techniques used in Bitcoin.
Cryptocurrency
fromBitcoin Magazine
2 weeks ago

Project Eleven To Award 1 BTC To Tackle Bitcoin's Quantum Vulnerability

Project Eleven launched the Q-Day Prize, offering 1 BTC for breaking ECC cryptography using Shor's algorithm on a quantum computer.
fromBitcoin Magazine
1 week ago
Python

Secp256k1lab: An INSECURE Python Library That Makes Bitcoin Safer

A new Python library 'secp256k1lab' provides a unified standard for Bitcoin Improvement Proposals, simplifying cryptographic implementation and reducing redundancy.
fromwww.scientificamerican.com
2 days ago
Information security

This Cutting-Edge Encryption Originates in Renaissance Art and Math

Renaissance art's perspective laws influenced Western art and led to modern cryptographic techniques used in Bitcoin.
more#bitcoin
#privacy
Privacy professionals
fromArs Technica
1 month ago

FBI raids home of prominent computer scientist who has gone incommunicado

Xiaofeng Wang, a prominent professor, has gone missing amidst FBI raids and communications removal, sparking speculation about serious allegations.
Privacy professionals
fromWIRED
4 weeks ago

Cybersecurity Professor Mysteriously Disappears as FBI Raids His Homes

A prominent computer scientist, Xiaofeng Wang, has vanished amid an FBI investigation, raising significant concerns in academic circles about privacy and security.
fromHackernoon
1 year ago
Cryptocurrency

The HackerNoon Newsletter: xAI's Grok 3: All the GPUs, None of the Breakthroughs (4/17/2025) | HackerNoon

Elon Musk's Grok 3 is touted as the world's best AI, sparking comparisons with competitors like GPT-4o and Claude 3.7.
fromHackernoon
1 year ago
London startup

Why Lattica's $3.25M Bet on Fully Homomorphic Encryption Could Change AI Privacy Forever | HackerNoon

Lattica's technology enables AI to process data privately using Fully Homomorphic Encryption, addressing major privacy concerns.
fromWIRED
7 months ago
Privacy professionals

Seriously, Use Encrypted Messaging

Encrypted messaging provides privacy for users, but also facilitates potential criminal activities.
fromHackernoon
1 year ago
Cryptocurrency

Enhancing Security and Privacy on the Bitcoin Network with Zero-Knowledge Proofs | HackerNoon

Zero-knowledge proofs enhance privacy and security in cryptocurrencies by allowing transaction verification without disclosing sensitive information.
Privacy professionals
fromArs Technica
1 month ago

FBI raids home of prominent computer scientist who has gone incommunicado

Xiaofeng Wang, a prominent professor, has gone missing amidst FBI raids and communications removal, sparking speculation about serious allegations.
Privacy professionals
fromWIRED
4 weeks ago

Cybersecurity Professor Mysteriously Disappears as FBI Raids His Homes

A prominent computer scientist, Xiaofeng Wang, has vanished amid an FBI investigation, raising significant concerns in academic circles about privacy and security.
fromHackernoon
1 year ago
Cryptocurrency

The HackerNoon Newsletter: xAI's Grok 3: All the GPUs, None of the Breakthroughs (4/17/2025) | HackerNoon

Elon Musk's Grok 3 is touted as the world's best AI, sparking comparisons with competitors like GPT-4o and Claude 3.7.
fromHackernoon
1 year ago
London startup

Why Lattica's $3.25M Bet on Fully Homomorphic Encryption Could Change AI Privacy Forever | HackerNoon

Lattica's technology enables AI to process data privately using Fully Homomorphic Encryption, addressing major privacy concerns.
fromWIRED
7 months ago
Privacy professionals

Seriously, Use Encrypted Messaging

Encrypted messaging provides privacy for users, but also facilitates potential criminal activities.
fromHackernoon
1 year ago
Cryptocurrency

Enhancing Security and Privacy on the Bitcoin Network with Zero-Knowledge Proofs | HackerNoon

Zero-knowledge proofs enhance privacy and security in cryptocurrencies by allowing transaction verification without disclosing sensitive information.
more#privacy
#quantum-computing
Information security
fromFuturism
6 months ago

Chinese Hackers Use Quantum Computer to Break Military Grade Encryption

Chinese researchers claim to have made advancements in quantum computing that could threaten current encryption standards.
The use of a D-Wave quantum computer showcases the potential risk against military-grade encryption protocols.
Information security
fromBig Think
7 months ago

A lab in the US unveils new tools to withstand encryption-breaking quantum

The introduction of new encryption algorithms aims to protect against future quantum computing cybersecurity threats.
Information security
fromNextgov.com
4 months ago

Agencies look to automation software to usher in next phase of post-quantum security

Federal agencies are preparing for quantum threats by integrating automated cryptography software into legacy systems, initiating migration to post-quantum standards.
OMG science
fromCSO Online
1 month ago

Researchers claim their protocol can create truly random numbers on a current quantum computer

Quantum computers can generate truly random numbers, aiding cryptographic implementations despite current limitations in their problem-solving capabilities.
Information security
fromFuturism
6 months ago

Chinese Hackers Use Quantum Computer to Break Military Grade Encryption

Chinese researchers claim to have made advancements in quantum computing that could threaten current encryption standards.
The use of a D-Wave quantum computer showcases the potential risk against military-grade encryption protocols.
Information security
fromBig Think
7 months ago

A lab in the US unveils new tools to withstand encryption-breaking quantum

The introduction of new encryption algorithms aims to protect against future quantum computing cybersecurity threats.
Information security
fromNextgov.com
4 months ago

Agencies look to automation software to usher in next phase of post-quantum security

Federal agencies are preparing for quantum threats by integrating automated cryptography software into legacy systems, initiating migration to post-quantum standards.
OMG science
fromCSO Online
1 month ago

Researchers claim their protocol can create truly random numbers on a current quantum computer

Quantum computers can generate truly random numbers, aiding cryptographic implementations despite current limitations in their problem-solving capabilities.
more#quantum-computing
OMG science
fromwww.scientificamerican.com
2 weeks ago

Alan Turing's Lost Work Could Reveal How Tigers Got Their Stripes

Alan Turing's contributions to mathematics and biology reveal the interconnectedness of his work in cryptography, computing, and pattern formation.
Women in technology
fromwww.nytimes.com
4 weeks ago

Betty Webb, Who Helped Bletchley Park Code Breakers, Dies at 101

Charlotte Webb, a pivotal Bletchley Park codebreaker, passed away at 101, leaving behind a legacy of significant contributions to WWII cryptography.
fromInfoQ
4 weeks ago
Games

How to Compute Without Looking: A Sneak Peek into Secure Multi-Party Computation

Secure Multi-Party Computation enables collaborative computations without data disclosure, ensuring privacy in low-trust environments.
It is applicable across multiple industries including finance, cloud computing, and healthcare, highlighting its versatility.
Techniques like secret-sharing and the Envelope Trick enhance data security and collaboration for sensitive computations.
#blockchain
fromHackernoon
1 month ago
Deliverability

No Waiting, No Mempool: How Solana Moves Crypto at Lightning Speed | HackerNoon

Solana transactions efficiently enable blockchain updates through a structured lifecycle and low-cost processing.
fromHackernoon
1 year ago
Privacy professionals

Holonym Foundation Raises $5.5 Million To Provide Global Digital Personhood With Human Keys | HackerNoon

Holonym Foundation has secured $5.5 million for developing digital identity solutions that enhance user control and privacy on the decentralized web.
fromHackernoon
2 years ago
JavaScript

How Binius Reduces Computational Complexity with Towers of Binary Fields | HackerNoon

Reducing bit width in blockchain computation enhances efficiency, as seen with the Binius project based on Binary Fields.
fromHackernoon
1 year ago
Miscellaneous

The Building Blocks of Secure Cross-Chain Options" | HackerNoon

Blockchain technology enhances transaction security and efficiency through decentralized record keeping and smart contracts.
Deliverability
fromHackernoon
1 month ago

No Waiting, No Mempool: How Solana Moves Crypto at Lightning Speed | HackerNoon

Solana transactions efficiently enable blockchain updates through a structured lifecycle and low-cost processing.
Privacy professionals
fromHackernoon
1 year ago

Holonym Foundation Raises $5.5 Million To Provide Global Digital Personhood With Human Keys | HackerNoon

Holonym Foundation has secured $5.5 million for developing digital identity solutions that enhance user control and privacy on the decentralized web.
fromHackernoon
2 years ago
JavaScript

How Binius Reduces Computational Complexity with Towers of Binary Fields | HackerNoon

Reducing bit width in blockchain computation enhances efficiency, as seen with the Binius project based on Binary Fields.
fromHackernoon
1 year ago
Miscellaneous

The Building Blocks of Secure Cross-Chain Options" | HackerNoon

Blockchain technology enhances transaction security and efficiency through decentralized record keeping and smart contracts.
more#blockchain
Artificial intelligence
fromWIRED
1 month ago

AI Thinks It Cracked Kryptos. The Artist Behind It Says No Chance

Amateur and professional cryptographers continue to struggle with the Kryptos code, particularly the unsolved K4 segment, fueling increased public interest.
Information security
fromThe Hacker News
2 months ago

Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats

Google Cloud introduces quantum-safe digital signatures to protect encryption systems against future quantum computing threats.
fromHackernoon
1 year ago
Miscellaneous

Build (And Then Crack) Your First Message Encryption Protocol With This Guide | HackerNoon

XOR encryption is simple, reversible, and supports multiple keys, making it a foundation of modern cryptographic protocols.
fromHackernoon
1 year ago
JavaScript

Modern Hashing With Go: A Guide | HackerNoon

Go provides two main types of hash functions: non-cryptographic for speed and cryptographic for security.
fromAgileabstractions
4 months ago
Information security

New Course: Secure Python Web Application Development

The course provides hands-on training in Full Stack Security with a focus on secure Python web application development and practical security tools.
fromMail Online
5 months ago
Writing

The 6 secret codes that remain unsolved - can you crack them?

Some historic codes have defied resolution despite advancements in cryptography.
Cracking historical puzzles could potentially solve crimes or uncover treasures.
fromInfoQ
5 months ago
Java

OpenJDK News Roundup: Compact Object Headers, Synch Virtual Threads, Disable Security Manager

OpenJDK is evolving with significant changes targeting JDK 24, including the removal of outdated features to enhance performance and security.
fromCoindesk
6 months ago
Miscellaneous

Buenos Aires Adds ZK Proofs to City App in Bid to Boost Residents' Privacy

Buenos Aires integrates zero-knowledge proofs into its app to enhance privacy for residents, allowing them to validate information without disclosing personal data.
#cybersecurity
Privacy professionals
fromwww.dw.com
7 months ago

Global police sting topples 'Ghost' criminal messaging app DW 09/18/2024

International police collaboration led to dismantling a criminal-focused encrypted platform, 'Ghost', resulting in significant arrests and prevention of violent crimes.
Privacy professionals
fromwww.independent.co.uk
7 months ago

Australian police infiltrate encrypted messaging app Ghost and arrest dozens

Australian police infiltrated the Ghost encrypted app, leading to numerous arrests and preventing severe criminal activities.
The app was developed specifically for criminal use, linking organized crime groups globally.
fromTheregister
6 months ago
Information security

WeChat devs modded TLS, introducing security weaknesses

WeChat's modified cryptographic protocol creates significant security weaknesses, particularly in metadata protection and encryption consistency for a widely used application.
fromTechRepublic
11 months ago
Information security

Hiring Kit: Cryptography Engineer | TechRepublic

Cryptography engineers are essential for ensuring digital system security.
Privacy professionals
fromwww.dw.com
7 months ago

Global police sting topples 'Ghost' criminal messaging app DW 09/18/2024

International police collaboration led to dismantling a criminal-focused encrypted platform, 'Ghost', resulting in significant arrests and prevention of violent crimes.
Privacy professionals
fromwww.independent.co.uk
7 months ago

Australian police infiltrate encrypted messaging app Ghost and arrest dozens

Australian police infiltrated the Ghost encrypted app, leading to numerous arrests and preventing severe criminal activities.
The app was developed specifically for criminal use, linking organized crime groups globally.
fromTheregister
6 months ago
Information security

WeChat devs modded TLS, introducing security weaknesses

WeChat's modified cryptographic protocol creates significant security weaknesses, particularly in metadata protection and encryption consistency for a widely used application.
fromTechRepublic
11 months ago
Information security

Hiring Kit: Cryptography Engineer | TechRepublic

Cryptography engineers are essential for ensuring digital system security.
more#cybersecurity
Cooking
fromWIRED
6 months ago

You Can Now See the Code That Helped End Apartheid

John Graham-Cumming decrypted a file that played a crucial role in South Africa's anti-apartheid history, highlighting tech's intersection with activism.
fromHackernoon
1 year ago
Cryptocurrency

EOS Network significantly Upgrades With 1-Second Transaction Finality | HackerNoon

EOS Network successfully upgraded to Spring 1.0, introducing the Savanna consensus algorithm, resulting in unprecedented 1-second transaction finality.
#ai
Artificial intelligence
fromTechRepublic
7 months ago

Gartner: The Top 10 Strategic Technology Trends For 2025

Rapid advancements in AI and computing are crucial for future IT strategies.
C-level executives should focus on technologies likely to disrupt industries by 2025.
Agentic AI will evolve to make autonomous decisions for users.
fromCoindesk
11 months ago
Artificial intelligence

Allison Duettmann: How Blockchains Can Make AI Safer

Allison Duettmann, CEO of Foresight Institute, delves into the potential of nanotechnology, space exploration, and cryptography in shaping the future of AI and technology.
Artificial intelligence
fromTechRepublic
7 months ago

Gartner: The Top 10 Strategic Technology Trends For 2025

Rapid advancements in AI and computing are crucial for future IT strategies.
C-level executives should focus on technologies likely to disrupt industries by 2025.
Agentic AI will evolve to make autonomous decisions for users.
fromCoindesk
11 months ago
Artificial intelligence

Allison Duettmann: How Blockchains Can Make AI Safer

Allison Duettmann, CEO of Foresight Institute, delves into the potential of nanotechnology, space exploration, and cryptography in shaping the future of AI and technology.
more#ai
OMG science
fromArs Technica
7 months ago

New multispectral analysis of Voynich manuscript reveals hidden details

The Voynich manuscript is likely a genuine medieval document rather than a forgery, with new findings suggesting early attempts to decode its script.
fromEngadget
7 months ago
Information security

YubiKey vulnerability will let attackers clone the authentication device

NinjaLab has revealed a vulnerability in YubiKey 5 Series that enables cloning of the devices, posing risks mainly to sensitive users.
fromHackernoon
1 year ago
Business

Educational Byte: Cryptography and Its Connection to Cryptocurrencies | HackerNoon

Cryptography evolved from secret writing to securing digital information, essential for personal privacy and online security today.
[ Load more ]