-
Why We Don’t Offer “Reset Password by Email”
Why magic links and email resets weaken account security, and what we do instead to keep accounts safe.
-
Authenticated ≠ Authorized: When Things Go Wrong
Real-world security breaches caused by confusing authentication with authorization, with technical deep dives and prevention strategies.
-
Mnemonic Seed Phrases Explained: A Technical Deep Dive
A rigorous technical analysis of BIP-39. We walk through the exact bitwise transformation of entropy into words, the PBKDF2 key stretching process, and how BIP-32 derives the master private key.
-
A Technical Deep Dive Into Passwordless Authentication (OPAQUE, WebAuthn, FIDO2)
Dive into the world of passwordless authentication with OPAQUE, WebAuthn, and FIDO2. Learn how these protocols work, their strengths, and why they're the future of secure login.
-
How Governments Access Your Cloud Data in 2025
Explore how governments worldwide can access your cloud-stored files in 2025, from the US CLOUD Act to EU directives and laws in China, Russia, and India. Learn the conditions and protect your privacy.
-
Password Hashing and Salting: Limits and Superior Alternatives
Dive into password hashing and salting: what they are, real-world examples, their limitations, and why PAKE protocols like OPAQUE offer superior security that protects accounts even from server breaches.
-
PGP Is Dead - And Here's the Autopsy Report
It's 2025. PGP is still the gold standard for a lot of people who should know better. Time referee an autopsy on a corpse that refuses to stay buried.
-
What Actually Makes a Cloud Storage Service 'Zero-Knowledge'?
Everyone claims 'zero-knowledge' these days. Most are lying, or at least bending the truth until it snaps. Here's what the term really means, where the lies hide, and how to tell who's legit.
-
Your Files Are Already Stolen – Quantum Just Needs Time
State actors are already archiving your encrypted files to crack them with quantum in 2030. Ellipticc Drive blocks them today with NIST-approved post-quantum crypto.