Cryptoucan™ usage: Command-line setup
Written by Jiří Keresteš on 2019-05-02
cryptoucanIn this week's post we'll look into setting up your Cryptoucan™ using
gpg
command-line utility.
Written by Jiří Keresteš on 2019-05-02
cryptoucanIn this week's post we'll look into setting up your Cryptoucan™ using
gpg
command-line utility.
Written by Lída Hrnčířová on 2019-04-25
cryptoucanIn this blog post we will show you which personal information stored on Cryptoucan™ you can modify and what software to use. This is accompanied by instructional video for Windows that will guide you through the whole personalization process.
Written by Jiří Keresteš on 2019-04-18
cryptoucanIn today's post, we will focus on one of Cryptoucan's many lines of defense: display power analysis attack prevention.
Written by Dominik Joe Pantůček on 2019-04-11
emailToday, I would like to talk about the habit that some companies still enforce. Sending HTML emails - ideally with some pseudo-legal notices and statements. Read on to find out why this is plain wrong on all counts.
Written by Dominik Joe Pantůček on 2019-04-04
clojureracketteachingAs you might have noticed, we are working with rather interesting technologies here at Trustica. Developing and manufacturing cryptographic USB device brought us to play with various hardware pieces and gave us a chance to work with interesting software development platforms, languages, operating systems and libraries.