Hash

The Wonders of Hashing

Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.
services

Who’s Using Encryption? Who’s Not?

Strongly encrypted communications are secure and private communications (as long as there is no monkey-business going on in the way the encryption is implemented into communicatio...
encryption

Reasons to Encrypt Your Data

Mankind has invented many ways to keep secrets. To send a private letter in Ancient Rome, nobles could shave a slave’s head, write the letter on the skin, wait for the hair to gro...
https

Digital Certificates and ‘HTTPS’

If we really wanted to thoroughly discuss ‘HTTPS’ and Digital Certificates, then we’d need to talk about cryptography, but don’t worry, because we’re going to go ahead and spare y...