PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIf You Can’t Beat AI, Then Adopt ItIntegrating OpenAI into Applications·3 min read·Mar 4, 2024----
PinnedProf Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceAssange, Snowden and the Trap DoorJulian Assange being arrested last week brought back the memories of how he leaked Edward Snowden’s memos around the possible existence of…·5 min read·Apr 22, 2019--3--3
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceYour Video AvatarAs humans we may soon be replaced in so many ways by AI.3 min read·15 hours ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceThe Largest Criminal Backdoor: Meet Dark WireOne of my favouriate films when I was younger was The Sting, and where scammers manage to create “the wire” scam and set up a phoney…6 min read·16 hours ago--1--1
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceIn FORTRA, GOD is REAL (unless declared INTEGER)I use Golang a good deal. In fact, it’s my “go-to” language (sorry for the pun), and the one I use most often when prototyping…3 min read·1 day ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceDo You Agree To Allow AI To Have Rights To Everything You Say, Do and Create?“You had to live — did live, from habit that became instinct — in the assumption that every sound you made was overheard, and, except in…4 min read·2 days ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceGroup and Epoch Secrets: Deriving Trusted Public KeysIf we were to start the Internet again, we wouldn’t need TLS, as we would encrypt data at its source. An improved method is to use MLS…3 min read·2 days ago----
Prof Bill Buchanan OBE FRSEPEM, DER and OpenSSH Formats For Elliptic Curve KeysElliptic curve cryptography (ECC) saved cybersecurity a whole lot of processing. Without it, we would be implementing key exchange with…6 min read·4 days ago----
Prof Bill Buchanan OBE FRSEBreaking Down ECDSA and Ed25519 Digital SignaturesModern digital signing often involves elliptic curve cryptography (ECC), and the two main methods are ECDSA and EdDSA. The most typical…4 min read·4 days ago----
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceJust Fellow In My Home City“Of all the small nations of this earth, perhaps only the ancient Greeks surpass the Scots in their contribution to mankind.” ― Winston…5 min read·6 days ago----