Posts by Ilias Abousalim
-
Ellipticc Joins the 2026 Cloudflare Startup Program
We were accepted into the 2026 Cloudflare Startup Program cohort — what it means for performance, reliability, and security of Ellipticc.
-
Paper Versioning: Restore, Diff, and Collaborate Safely
Paper now keeps lightweight, encrypted versions so you can preview diffs, restore previous states, and collaborate without sacrificing privacy.
-
Introducing Paper: Docs That Actually Respect Your Privacy
Paper is a lightweight, modern document editor built on PlateJS. Create, edit, share, and export documents from your Ellipticc Drive account.
-
Why We Don’t Offer “Reset Password by Email”
Why magic links and email resets weaken account security, and what we do instead to keep accounts safe.
-
Encrypted Tags: Tag Your Files Privately
New: encrypted, client-side tags with custom labels, color coding, and advanced tag search, all without exposing your tags to our backend.
-
Why 'No IP Logging' Is a Myth in Real Cloud Systems
A concise, technical breakdown of where IPs exist, what ‘no IP logging’ can realistically mean, and how to evaluate claims without marketing hype.
-
Introducing Spaces: Reimagine Quick Access with Custom Categories
Spaces let you create custom Quick Access categories with your chosen icon, color, and title, so your files and folders feel like yours.
-
Encrypted Comments for Encrypted Shares
Secure, end-to-end encrypted comments on shared files. Only people with the share link can read comments, ensuring privacy.
-
Symmetric vs. Asymmetric Cryptography (What Actually Matters)
A deep dive into symmetric and asymmetric cryptography: how they work, why both exist, and when to use each for real security.
-
What Metadata Is and Why It’s More Valuable Than Content
Metadata powers search, personalization, and surveillance - often more valuable than content.
-
What a Cryptographic Key Is (And Why Losing It Is Final)
A beginner-friendly guide to understanding cryptographic keys, how they secure your data, and why losing them means irreversible loss.
-
Authenticated ≠ Authorized: When Things Go Wrong
Real-world security breaches caused by confusing authentication with authorization, with technical deep dives and prevention strategies.
-
Why Randomness Is the Most Important Security Feature
Discover why true randomness is the foundation of modern cryptography and why predictable systems always fail.
-
Cryptography Explained Simply: The Concepts That Actually Matter
A straightforward guide to the core concepts of cryptography that matter, without the jargon or math.
-
Announcing Our Partner Program: Creators Earn, Users Get More Storage
We just launched our partner program — creators with audiences can earn money, and every user can earn up to 10 GB extra storage by referring friends.
-
Who Benefits From Your Data Not Being Private?
Privacy loss isn't an accident. It's an economy. Here is exactly who profits from your data and why they are terrified of you taking it back.
-
Threshold Cryptography and Shamir’s Secret Sharing: Real Use Cases vs Dangerous Myths
Exploring threshold cryptography and Shamir's Secret Sharing: real applications vs common myths.
-
A Technical Deep Dive Into Passwordless Authentication (OPAQUE, WebAuthn, FIDO2)
Dive into the world of passwordless authentication with OPAQUE, WebAuthn, and FIDO2. Learn how these protocols work, their strengths, and why they're the future of secure login.
-
How Governments Access Your Cloud Data in 2025
Explore how governments worldwide can access your cloud-stored files in 2025, from the US CLOUD Act to EU directives and laws in China, Russia, and India. Learn the conditions and protect your privacy.
-
The Hidden Dangers of AI Training on Your Personal Data—and How to Safeguard It
Discover how AI models are trained on your personal cloud data and learn why unbreakable encryption and quantum-resistant security are crucial for protecting your files, photos, and memories.
-
3 Common Crypto Privacy Myths Debunked
Separate fact from fiction in crypto privacy. Learn why some popular beliefs are dangerous and what really protects your digital life.
-
How Bitcoin Works: A Complete (Technical) Guide
How Bitcoin works under the hood: transactions, blocks, consensus, the technical stack and how quantum computing affects its security.
-
How to Use PGP: A Complete Guide to Pretty Good Privacy
PGP revolutionized secure communication in 1991, but is it still relevant in 2025? Learn how PGP works, how to use it safely, and why modern alternatives might be better.
-
What Is E2EE and Is It Actually Secure?
Everyone throws the term 'end-to-end encryption' around like it solves everything. Most of the time it doesn’t. Here’s exactly what real E2EE requires, where it breaks, and how to tell the difference between the real thing and marketing theater.
-
What Is SHA? The Only Deep Dive You’ll Ever Need
From Git commits to Bitcoin blocks, from TLS certificates to password hashes, SHA is everywhere. Most developers use it daily without understanding why it works, what actually breaks, and why you’re probably using it wrong.
-
What Is Shor's Algorithm - And Why It's the Single Biggest Threat to Classical Cryptography
One algorithm. One quantum computer. Every RSA key, every ECC key, every Bitcoin wallet you ever created becomes readable or forgeable in minutes. This isn't sci-fi. This is math.
-
If Your Cloud Storage Doesn’t Protect Your Link Sharing, It’s Already Compromised
Everyone obsesses over file encryption. Meanwhile, shared links leak IPs, file sizes, timestamps, social graphs, and referrer trails. Most 'private' sharing is a joke.
-
The Biggest Security Liability in Cloud Storage Isn't Hackers, It's Your Provider
You patch your passwords, enable 2FA, and freak out about ransomware. Meanwhile the company holding your entire digital life has unrestricted root access and a legal team on speed-dial for subpoenas.
-
PGP Is Dead - And Here's the Autopsy Report
It's 2025. PGP is still the gold standard for a lot of people who should know better. Time referee an autopsy on a corpse that refuses to stay buried.
-
What Actually Makes a Cloud Storage Service 'Zero-Knowledge'?
Everyone claims 'zero-knowledge' these days. Most are lying, or at least bending the truth until it snaps. Here's what the term really means, where the lies hide, and how to tell who's legit.
-
Kyber vs RSA-2048 - Explained Simply (and Why RSA Is Already Dead)
A no-math deep dive into why the encryption protecting your cloud files today will be broken by quantum computers tomorrow, and why Kyber is the only realistic replacement.
-
Why We Bet on Post-Quantum Encryption for Everyday Cloud Storage
Your files uploaded today could be cracked tomorrow by a quantum computer. Here’s why we went all-in on post-quantum crypto from day one, and why you should care even if you’re not a cryptographer.
-
Ellipticc Drive: Open-Source Powerhouse with Bulletproof Post-Quantum Crypto
Dive into our fully open-source codebase and unpack the PQC magic securing your files against tomorrow's quantum threats, E2EE done right.
-
End-to-End Encryption: The One Thing Your Cloud Drive Probably Doesn’t Have
If the company can read your files, someone eventually will. Here’s what real E2EE actually means, and why it matters to normal people.
-
Your Files Are Already Stolen – Quantum Just Needs Time
State actors are already archiving your encrypted files to crack them with quantum in 2030. Ellipticc Drive blocks them today with NIST-approved post-quantum crypto.
-
How Ellipticc Will Revolutionize the Way You Interact with Privacy-First Software
Privacy software often feels like a burden. Ellipticc is changing that, making true end-to-end, post-quantum security seamless, instant, and superior to surveillance alternatives.
-
Launching Ellipticc Drive
Ellipticc Drive launches with full end-to-end encryption, quantum-resistant cryptography, open-source code, and 10 GB free storage. No ads, no tracking, no compromises on privacy.