Image for post
Image for post
Photo by Jeremy Perkins on Unsplash

For the last thirty years the prevailing approach to securing IT has been to secure the network from the outside world: “build a tall, strong, wall with well-guarded gates.” From many perspectives this has been a good choice; InfoSec teams focus their efforts and budget on ingress-egress points without having to manage the complexity and churn of an organization’s internal affairs. Unfortunately, it also means that any breach of the perimeter often leads to catastrophic failure.

In practice, organizations do watch the inside of their networks for threat actors, both insider and external, who might mean them harm; but even this approach still largely trusts the IT network. …

Image for post
Image for post
Photo by NASA on Unsplash

SpiderOak’s vision is to Secure the World’s Data.

Our goal is to reduce the complexity of the security surface to the point where it can be reasoned about, so that assumptions are few, and those that remain are well understood. This means reducing both lines of code and the number of people who must be trusted to enable secure data storage and access.

As a customer-focused company, we understand that technology alone cannot solve all problems. Products and support that work with your existing investments are required.

This is our new mission. We are a thirteen-year-old company which provides tens of thousands of businesses and consumers with best-in-class secure backup and messaging. Now with new management we have extended our expertise to deliver a whole new class of capabilities for securing shared data and managing authority. …

Image for post
Image for post

Cryptography, the art and science of encrypting sensitive information, is becoming increasingly commonplace in our day to day lives. From iPhones to bank accounts, most of us already interact with cryptography daily, and increasing numbers of people are recognising the value of VPNs when it comes to protecting their privacy. Computers and the internet have allowed the development of a public encryption standard (DES) and the invention of public-key cryptography, two processes which have hauled cryptography, traditionally the preserve of governments and militaries, into the public domain.

A Brief History of Cryptography

The history of cryptography and encryption can be traced much further into the past than most people might think, certainly beyond the dawn of the computer age. Evidence of cryptography has been discovered in Ancient Egypt, and Julius Caesar developed a cipher for his personal communications. Al-Kindi, an Arab polymath, developed cryptography as we recognise it today, however it remained a slow and clumsy method for communication. As recently as the Second World War, US soldiers were forced to make the decision whether to wait for hours to send or receive an encrypted message, or share the information with enemy eavesdroppers in the hope that allied forces would react more quickly. It was, however, during this conflict that a new encryption method was developed, based on the Navajo language, which remains the only spoken military code never to have been deciphered. …



Security with no backdoors. End-to-end encrypted collaboration and backup. Protecting your security with No Knowledge software for 11 years.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store