Securing your digital home – part 3: keys and other secrets

In part 2 of this series we walked through the thought process around your digital ID. Once that’s established, you need to protect the keys and other secrets attached to this identity, such as passwords and cryptographic keys. In this blog post I will write about my own personal approach to this with some recommendations. … Continue reading Securing your digital home – part 3: keys and other secrets

Should developers be responsible for potentially harmful software?

With the recent news concerning the arrest of Marcus Hutchins — the security researchers who stopped the biggest-ever ransomware attack — I’ve been thinking (more than usual) about the ethics of software development. But before we go into that, who’s Marcus Hutchins and what did he really do? Hutchins, is a so-called security researcher which … Continue reading Should developers be responsible for potentially harmful software?

Non-technical explanation of encryption and digital signatures

Having a basic understanding of encryption and digital signatures has become important as history has repeatedly taught us that we can’t trust everyone on the Internet (e.g. Internet service providers, email services etc.). This blog post will try to explain in a non-technical way how encryption and digital signatures work and why something called “private … Continue reading Non-technical explanation of encryption and digital signatures

What is Vault 7? And how not to be spied on

Have you heard about the latest Wikileaks release called Vault 7? The short version: If you ever were sceptic about “USA is spying on everyone on the Internet” you can stop being sceptic now… Since 7 March we know, for a fact, that they’re capable of hacking into, listening and recording on pretty much any […]