Interesting Security

How did the Enigma Machine work?

This video uses 3D animation to go inside the legendary Enigma Machine, which encrypted German military secrets during World War II. Time stamps: 1:01-Encryption 2:42-Engima Machine 4:23-Simple Circuit Example 5:23-Inside the Machine 6:15-Rotors 8:51-Plugboard 10:08-Keyboard Mechanism 12:14-The Circuit 13:15-Circuit Recap 14:38-Rotor Mechanism 17:06-Machine Settings 18:14-Brilliant

Read More

Reliable Email Providers More Private than Gmail

Strong user privacy controls in Gmail are not a priority for Google. There are reliable free and paid email providers offering security and privacy with strong encryption and anonymous usage. censiCLICK highlights the most prominent ones.

Read More
Quantum Computing

Shohini Ghose on a Beginner’s Guide to Quantum Computing

A quantum computer isn’t just a more powerful version of the computers we use today; it’s something else entirely, based on emerging scientific understanding — and more than a bit of uncertainty. Enter the quantum wonderland with TED Fellow Shohini Ghose and learn how this technology holds the potential to transform medicine, create unbreakable encryption […]

Read More
Research Security

AES (Advanced Encryption Standard) Explained

Computerphile explored AES (Advanced Encryption Standard) with Dr Mike Pound explains.

Read More
Azure Security

Introduction to Azure Key Vault

Azure 4 Everyone provides an introduction to what Azure Key Vault service with few demos using Logic Apps connectors, MSI with REST API and data factory. Using Azure Key Vault Service allows for centralization and protection of your application secrets, certificates but also encryption keys for Virtual Machines.  Related links Azure Key Vault documentation  Understand […]

Read More
Blockchain Cryptocurrency Quantum Computing

Quantum Supremacy?!

Siraj Raval covers Google’s claim to have achieved Quantum Supremacy in a research paper that was briefly leaked on a NASA website. The paper was taken down, but the Internet moves fast to recover data. In this episode, Siraj explores what quantum supremacy means, what the applications of quantum computing will be, and how a […]

Read More
Quantum Computing Security

How Quantum Computers Break Encryption

Here’s a great explanation of Shor’s Algorithm and how quantum computing could alter encryption forever.

Read More
Cryptocurrency Security

How Secure is 256 Bit Encryption?

In case you’re wondering exactly how hard it is to crack 256-bit encryption or mess with the blockchain.

Read More