Category: Assumptions

  • Strong Ciphers, Weak Assumptions

    The best laid plans of mice and men… A lot of attention has been paid to the design and implementation of messaging apps. Signal usually comes out as being considered the most trustworthy of the bunch by people who worry about detail, but there are other apps with real end-to-end encryption too. Of course, subverting…

    Read more

  • PQC Planning: Don’t Put It Off Any Longer…

    …but it might not be as onerous as you imagine. Let’s dive right in; there is no time like the future! Why plan now if we cannot implement yet? This is the crux of the matter. And the answer isn’t necessarily obvious. However, consider data that you hold now for which the C&I requirement may…

    Read more

  • Assumptions: Dangerous Things

    How long can a name be? How short can an email address be? All around us, IT systems have built-in assumptions and limitations. To be clear, they always have had limits, either explicitly chosen, or ones beyond which the system tends to fail in unpredictable ways. However, now that so many facets of our lives…

    Read more