Blog

Cryptoucan™ laser engraving

Written by Dominik Joe Pantůček on 2018-09-28

Although the time is running really fast as we are preparing for regular batch production, there still were some interesting challenges. One of them was the engraving. Read on to find out why.

...

Cryptoucan™ physical tamper protection

Written by Dominik Joe Pantůček on 2018-09-20

These are really busy times here at Trustica. We are producing the last few units using the single unit casting process but in the meantime we have already placed an order for a small batch to check whether the whole process is sound. In a few weeks we will know for sure. But in the meantime, read on to see what we have done to one unit.

...

Key management - introduction

Written by Dominik Joe Pantůček on 2018-09-13

Although there are things moving quickly ahead with Cryptoucan™, we will slow down with our publishing schedule and look at related - and very important - topic. Having trusted and secure cryptographic token is just one part of the puzzle. Read on to get some tips for various scenarios where you need more than just a key which you can use for signing or decrypting something.

...

Cryptoucan™ usage: SSH authentication

Written by Dominik Joe Pantůček on 2018-09-06

With the maintenance release of GnuPG and finalizing our manufacturing process before starting another small batch production this week, the last week was without an associated video. Read on to see one that will show you some functionality beyond casual email signing and learn why we are so excited that Cryptoucan™ is nearing retail release!

...

Securing email

Written by Dominik Joe Pantůček on 2018-08-30

After creating a robust solution for mail sending, filtering, delivering and storing, one starts wondering how to add more confidentiality and integrity to such communication setup security mix. DKIM signatures and SPF records are mostly helpful for fighting spam, but for an targeted attack they pose little to no threat. And as targeted attacks are always really big threat, this does not make the situation look very optimistic for the email user. Nowadays, there are at least two major standards used for securing email communication. Both have their advantages and both have their disadvantages - so let's have a closer look at both of them. And as you can probably guess, we are getting closer to our goal of securing email communication using at least one of these standards.

...