Author Archives:

36C3 – Cryptography demystified

December 29th, 2019 | 🕒 An introduction without maths This talk will explain the basic building blocks of cryptography in a manner that will

36C3 – (Post-Quantum) Isogeny Cryptography

December 28th, 2019 | 🕒 There are countless post-quantum buzzwords to list: lattices, codes, multivariate polynomial systems, supersingular elliptic curve isogenies. We cannot possibly

Cryptography of Killing Proof-of-Work

September 11th, 2019 | 🕒 We briefly discuss the range of cryptographic primitives being used by protocols that seek to make proof-of-work protocols obsolete.

Introduction to (home) network security.

August 21st, 2019 | 🕒 A beginner-friendly guide to network segmentation for privacy and security in the age of the Internet of Insecure Things.

35C3 – Sneaking In Network Security

December 30th, 2018 | 🕒 Enforcing strong network segmentation, without anyone noticing Highly compartmentalized network segmentation is a long-held goal of most blue teams,