Hardware is hard. Or is it? In today’s blog, we are going to explore the scary valley between prototyping and production. Read on to learn more about the journey from an idea to a production-ready part.
Designing a perfect storage for your private keys is one thing. But generally speaking – using cryptography properly is much bigger challenge for the users and all the software in security ecosystem. Read on to find some interesting aspects of symmetric ciphers you might not have known about.
After a few weeks with OpenCV, we had to admit, that there are certain drawbacks to its usage for our purpose. Different default versions on different platforms, troubles with memory leaks and the need to convert between incompatible image formats. Read on to see what solution we used for addressing these issues.
As we are getting closer and closer to shipping first units of Cryptoucan™, we are also preparing series of videos which would guide our customers through the whole process of using the device itself and the use of it with specific operating systems and e-mail clients. Now we can proudly introduce you to the first video that will give you clear idea of what Cryptoucan™ looks like and what elements you can find on its outer body.
As we are successfully finishing casting our first batch of 28 Cryptoucans™ into epoxy and we are starting the molding process of the second batch of 112 Cryptoucans™, it is the time to allow our customers to customize the engraving on the back of the device. Read on to see how we implemented our own software for creating the engraving pictures.