Software Development

Applied Cryptography

Information Networks

Our products and services build upon the foundations in these three areas and we always do our best for ensuring the resulting product contains the best of them.

We have been working for you for over 20 years on the following:

cat illustration

Owl - icon

Applied Cryptography

Although cryptography has its roots in abstract mathematics, its proper usage always comes with huge real-world impact on mitigating the risks of business operation problems and monetary damages.

...

Wasp - icon

Penetration Testing

Information security management includes the necessity to regularly test the systems and infrastructure security. Security auditing and penetration testing is used for performing such regular testing.

...

Ammonite - icon

Systems Architecture

Professional analysis and viable design and implementation of specialized software or secure server and network infrastructure are the key components for success of new and current services no matter the scale.

...

Latest posts

GPG-Agent Socket Paths

Written by Dominik Pantůček on 2024-12-19

Originally working on a YubiKey support for Crypt4GH stream processing library turned out to become a work to fully support GnuPG at least on UNIX platforms. In recent GnuPG versions everything is handled by gpg-agent but an interesting problem arose - how to find its socket when using alternative GnuPG homedir?

...

Controlling Rclone in Racket

Written by Dominik Pantůček on 2024-12-05

Analyzing cryptographic systems usage with respect to how the users interact with it sometimes requires programmatically simulating their actions. It is no different with our recent work on rclone cryptographic keys handling. However we are lucky that Racket provides all the functionality we needed!

...

LibAssuan Binary S-Expressions

Written by Dominik Pantůček on 2024-11-21

Faced with the requirement of computing symmetric key from the result of Elliptic-Curve Diffie-Hellman key exchange according to a specification, the primary ingredient for such calculation is the result itself. Read on to see how Interesting things you may find if you need to use YubiKey's OpenPGP Card application as a foundational component of any solution.

...