Optimize for security, not just for speed

Written by Jiří Keresteš on May 9, 2019.

In today’s article, we’re going to explain why you should think twice before enabling compiler optimizations.

■ ■ ■

Cryptoucan™ usage: Command-line setup

Written by Jiří Keresteš on May 2, 2019.

In this week’s post we’ll look into setting up your Cryptoucan™ using gpg command-line utility.

■ ■ ■

Cryptoucan™ usage: Personalization

Written by Lída Hrnčířová on April 25, 2019.

In this blog post we will show you which personal information stored on Cryptoucan™ you can modify and what software to use. This is accompanied by instructional video for Windows that will guide you through the whole personalization process.

■ ■ ■

Side channel attacks: Display

Written by Jiří Keresteš on April 18, 2019.

In today’s post, we will focus on one of Cryptoucan’s many lines of defense: display power analysis attack prevention.

■ ■ ■

Authenticated emails and HTML

Written by Dominik Joe Pantůček on April 11, 2019.

Today, I would like to talk about the habit that some companies still enforce. Sending HTML emails – ideally with some pseudo-legal notices and statements. Read on to find out why this is plain wrong on all counts.

■ ■ ■