The Wonders of Hashing

Cryptographic hash functions are a ubiquitous tool in computing, used for everything from identity verification to malware detection to file protection.

Who’s Using Encryption? Who’s Not?

Strongly encrypted communications are secure and private communications (as long as there is no monkey-business going on in the way the encryption is implemented into communicatio...

Reasons to Encrypt Your Data

Mankind has invented many ways to keep secrets. To send a private letter in Ancient Rome, nobles could shave a slave’s head, write the letter on the skin, wait for the hair to gro...

Digital Certificates and ‘HTTPS’

If we really wanted to thoroughly discuss ‘HTTPS’ and Digital Certificates, then we’d need to talk about cryptography, but don’t worry, because we’re going to go ahead and spare y...