facebook
vpnMentor: You arrived to the event to present bitcoin. How much prominent is it in your research or is this just a hype that will not be included in your articles in 5 years? I have been mostly doing research in theoretical cryptography until recently. What I am looking for in my research is conceptually...
facebook
vpnMentor: In your presentation* you mentioned we still use a TLS protocol that was introduced in 1999. Doesn’t that mean that everything works very well and we can feel secure? *Attached at the end of this page are Dr. Jager’s presentations in a conference at the Center for Research in Applied Cryptography and Cybersecurity of Bart...
facebook
Thyla van der Merwe received a BCom in Mathematics, Statistics and Economics, a BSc (Hons) in Mathematics and an MSc in Mathematics from the University of Cape Town, South Africa. She has a graduate MSc in Information Security at Royal Holloway, University of London as a FirstRand Laurie Dippenaar scholar. Prior to starting at Royal...
facebook
A three days long hackathon on the subject of anonymity on the web at Bar Ilan University has exposed breaches in the encryption mechanism of the search engine that boast using the slogan “The search engine that doesn’t track you”. The vpnMentor team cover exclusively the hackathon and accompanied the teams from day one up...
facebook
Jonathan J. Klinger is an attorney who specializes in technology law in general and privacy and security law in particular.  He has been practicing law for over 11 years and has been an independent sole-practitioner since 2007. The majority of his clients are technology companies, in the areas of security, publishing, and data mining.  Jonathan...
facebook
About the authors: Sudhanshu Chauhan is an information security professional and OSINT specialist. He has worked in the information security industry, previously as Senior security analyst at iViZ and currently as Director and Principal Consultant at Octogence Technologies. Sudhanshu has also written various articles on a wide range of topics including Cyber Threats, Vulnerability Assessment,...