Blog

Authenticated emails and HTML

Written by Dominik Joe Pantůček on 2019-04-11

Today, I would like to talk about the habit that some companies still enforce. Sending HTML emails - ideally with some pseudo-legal notices and statements. Read on to find out why this is plain wrong on all counts.

...

Working with Clojure and Racket

Written by Dominik Joe Pantůček on 2019-04-04

As you might have noticed, we are working with rather interesting technologies here at Trustica. Developing and manufacturing cryptographic USB device brought us to play with various hardware pieces and gave us a chance to work with interesting software development platforms, languages, operating systems and libraries.

...

Cryptoucan™ usage: Installing the essentials on Windows

Written by Lída Hrnčířová on 2019-03-28

We're working on a series of instructional videos to make the transition to our product as smooth as possible. This week we will look at all the components necessary for using your Cryptoucan™ with Thunderbird e-mail client on Windows. Video of the installation process included!

...

Diffie-Hellman Key Exchange

Written by Dominik Joe Pantůček on 2019-03-21

Before Cryptoucan™, there were just elliptic curves stored in your computer. And before elliptic curves, there were exponential groups over finite fields. Read on to learn some history here.

...

Rapid prototyping in Cryptoucan™ development

Written by Jiří Keresteš on 2019-03-14

Hardware is hard. Or is it? In today's blog, we are going to explore the scary valley between prototyping and production. Read on to learn more about the journey from an idea to a production-ready part.

...