Three Steps to Secure Your Social Media Accounts

Today, a typical internet user has dozens of passwords to keep safe. The first thing hackers do when they've compromised a username and password from one site is try and log into a different site with the same details. The best way to avoid…

By Ashley Burton

How Digital Signatures Work

Digital signatures are used anywhere you might need to prove that you are communicating with the individual, organisation or service that you expect to be. This might be through digitally 'signing' an email or providing 'signed' software to end users to prove that it's…

By Ashley Burton

Creating Certificates with the Nitrokey HSM 2 and XCA

A digital certificate makes use of Public Key Cryptography to authenticate users, essentially blending a Public Key with a Digital Signature to assert identity. The most common standard used for certificates is X.509 and common uses of certificates include: XCA is a small, lightweight…

By Ashley Burton

What is Public Key Cryptography?

We all make use of public key cryptography in our day to day lives but it's one of those technologies we rarely think about. For starters, you're reading this post over HTTPS which uses public key cryptography as does your banking app and most…

By Ashley Burton

Getting Started with the Nitrokey HSM 2

The folks at Nitrokey kindly sent me a Nitrokey HSM 2 as part of the Nitrokey Community Program. The tiny, thumb-drive sized device is actually a Hardware Security Module, a device that holds cryptographic keys and performs encryption and decryption. If you've not come…

By Ashley Burton