A Guardian Agent for Secure Delegation
Dima Kogan | July 2, 2018
Is Secure Shell (SSH) protocol truly secure? Discover the vulnerabilities in today’s SSH protocols and how a new guardian agent can provide secure delegation.
Rocket: Securing the Web at Compile-time
Sergio Benitez | July 10, 2018
Learn why companies such as NPM, System76 and Mozilla have implemented Rocket (for Rust) in production.
Protecting Patient Privacy in Genomic Analysis
David Wu | July 17, 2018
Analyzing collective patient data is crucial to diagnosing diseases, but privacy is a major concern. Learn how modern cryptographic tools can be leveraged for genome privacy.
Ethereum 2.0 and Beyond
Ethereum 2.0 (also known as “Serenity”) marks the final phase of Ethereum’s original four stage launch. Learn how the Blockchain powerhouse will tackle key issues such as scalability, security, and proof-of-stake.
A New Design for Anonymous Cryptocurrencies
In a world of freely accessible data on the web, financial privacy is becoming increasingly important. But despite the use of pseudonyms, most cryptocurrencies do not provide a significant level of protection for end-users. Learn a new way of keeping cryptocurrency transactions anonymous.
The Truth About Decentralized Exchanges
There are many benefits for trading cryptocurrencies in a decentralized exchange, primarily its resistance to a central authority. With these benefits, however, come challenges in both privacy and scalability. Learn about an innovative solution for trading crypto in the future.