PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into Applications·3 min read·Mar 4, 2024----
PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…·5 min read·Apr 22, 2019--3--3
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceJust Fellow In My Home City“Of all the small nations of this earth, perhaps only the ancient Greeks surpass the Scots in their contribution to mankind.” ― Winston…5 min read·5 hours ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Ultimate Infostealer … Microsoft Recall?“If you want to keep a secret, you must also hide it from yourself.” ― George Orwell, 19845 min read·19 hours ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceToken Stealing: Platform or Customer Compromise?This week could see one of the largest data breaches ever, with Ticketmaster and Santander linked to a massive leak of customer data…8 min read·1 day ago----
Prof Bill Buchanan OBE FRSEWho Would Ever Want to be a CIO: The Largest Data Hack Ever?This week could see the largest data hack ever, and which are linked to the Snowflake cloud provider. This includes breaches against…5 min read·2 days ago--2--2
Prof Bill Buchanan OBE FRSEIsogenies Are Still Cool?You are likely to be using an elliptic curve method — ECDH — to access this page. But in a few years, it is unlikely that we will still be…11 min read·2 days ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceLove P256, but also want Kyber?P256 rules in key exchange, and is, by far, the most popular method used with ECDH (Elliptic Curve Diffie Hellman). But, elliptic curve…3 min read·3 days ago----
Prof Bill Buchanan OBE FRSEHomomorphic Encryption, Secure Shares and MPC Come Together To Protect UsYour biometrics — such as your fingerprints, your face, and your iris — are some of your most sensitive data captures. Why? Well, there’s…6 min read·3 days ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceHappy 50th Birthday to SQLFor decades, it was IBM who were at the forefront of computing, and who conducted world-leading research. And, so, in 1957, they created…·7 min read·4 days ago--3--3