Aug 302016
 

As most of us know, there are several problems/quirks/flaws with Javascript and this is known as the Javascript problem. However, like it or not, as long as we use browsers, we need Javascript.

So, what is the solution?

Pick your favorite language (hope it is not Javascript!) and hope that there is a transpiler ... read more

Aug 162016
 

I read an article titled Frequent password changes are the enemy of security which I find misleading and missing the point.

In this article, Carnegie Mellon University professor Lorrie Cranor, who became chief technologist at FTC challenges FTC’s advice

FTC’s advice: Encourage your loved ones to change passwords often, making them long, strong, and unique.

... read more
Oct 132015
 

Elliptic Curve Cryptography: computing shared key

If Alice and Bob want to exchange encrypted messages, they need to first agree on a Key. This shared key (also known as symmetric key) will be used to by both parties to encrypt messages. There are many ways of arriving at the shared key (including the old fashioned ... read more