2025
-
Threshold Cryptography and Shamir’s Secret Sharing: Real Use Cases vs Dangerous Myths
Exploring threshold cryptography and Shamir's Secret Sharing: real applications vs common myths.
-
Operational Security for Normal People: A Practical Guide
Practical steps to protect your digital life without paranoia. Real advice for everyday users who want better security habits.
-
A Technical Deep Dive Into Passwordless Authentication (OPAQUE, WebAuthn, FIDO2)
Dive into the world of passwordless authentication with OPAQUE, WebAuthn, and FIDO2. Learn how these protocols work, their strengths, and why they're the future of secure login.