Homepage
Open in app
Sign in
Get started
ASecuritySite
When Bob Met Alice
Follow
Braid Cryptography for Diffie-Hellman Key Exchange
Braid Cryptography for Diffie-Hellman Key Exchange
Cryptography is great fun, and I discover new things every single day. One method is the usage of Braid Cryptography. With this, we use a…
Prof Bill Buchanan OBE FRSE
Jun 11
Apple Builds The Cloud The Way It Was Meant To Be: Secure Off-device Processing
Apple Builds The Cloud The Way It Was Meant To Be: Secure Off-device Processing
Apple Shows Microsoft How To Process Off-device Data
Prof Bill Buchanan OBE FRSE
Jun 10
Your Video Avatar
Your Video Avatar
As humans we may soon be replaced in so many ways by AI.
Prof Bill Buchanan OBE FRSE
Jun 9
The Largest Criminal Backdoor: Meet Dark Wire
The Largest Criminal Backdoor: Meet Dark Wire
One of my favouriate films when I was younger was The Sting, and where scammers manage to create “the wire” scam and set up a phoney…
Prof Bill Buchanan OBE FRSE
Jun 9
In FORTRA, GOD is REAL (unless declared INTEGER)
In FORTRA, GOD is REAL (unless declared INTEGER)
I use Golang a good deal. In fact, it’s my “go-to” language (sorry for the pun), and the one I use most often when prototyping…
Prof Bill Buchanan OBE FRSE
Jun 8
Do You Agree To Allow AI To Have Rights To Everything You Say, Do and Create?
Do You Agree To Allow AI To Have Rights To Everything You Say, Do and Create?
“You had to live — did live, from habit that became instinct — in the assumption that every sound you made was overheard, and, except in…
Prof Bill Buchanan OBE FRSE
Jun 7
Group and Epoch Secrets: Deriving Trusted Public Keys
Group and Epoch Secrets: Deriving Trusted Public Keys
If we were to start the Internet again, we wouldn’t need TLS, as we would encrypt data at its source. An improved method is to use MLS…
Prof Bill Buchanan OBE FRSE
Jun 7
About ASecuritySite: When Bob Met Alice
Latest Stories
Archive
About Medium
Terms
Privacy
Teams