top of page
Security.BitMint.com
Randomness is a trusted shield against smarter and better equipped adversaries
Search


AI Accelerated Brute Force Cryptanalysis: Bigger Threat than Quantum
Plain brute force cryptanalysis is destined to check on average half the possible secret keys that guard any cyber secret, including...
Gideon Samid
Dec 7, 20241 min read
3 views
0 comments


Proof-of-Secrecy (POS) Cryptography
To say that cryptography today is constituted on arrogance and hubris, is to risk being summarily dismissed by anyone who counts. And it...
Gideon Samid
Nov 27, 20242 min read
1 view
0 comments


Cryptography and Privacy: An Impactful Milestone Ahead
Privacy is back in the hands of the user, dial it up as high as you please! Freedom Wins!
Gideon Samid
May 24, 20235 min read
47 views
0 comments


Will AI Demolish Cryptography?
In the 70s of the last century a thousand years old premise of cryptography was challenged. The idea of using the same key to encrypt a...
Gideon Samid
Apr 12, 20233 min read
20 views
0 comments


AI is here, Cryptography! Are you ready?
It has shaken every other field. It is coming for you (or rather for us, I should say). It is opening a new line of attack, one we have...
Gideon Samid
Apr 7, 20232 min read
23 views
0 comments


How did Russia get under our Cyber Skin?
US Intelligence was stymied by Stalin's spies who used an American super cipher, which we dismissed... It was the notorious Vernam...
Gideon Samid
Apr 18, 20222 min read
31 views
0 comments


Family Key: Interchangeable Symmetric Keys: a new Cryptographic Paradigm
In the current crypto paradigm a single secret key transforms a plaintext into a ciphertext and vice versa, or at most a different key is...
Gideon Samid
Mar 29, 20212 min read
68 views
0 comments


High Profile Spending Espionage
Silent Reading of Credit Card Spending History of High Level people is Sold to their Rivals -- a new line of Industrial Surveillance....
Gideon Samid
Mar 4, 20211 min read
11 views
0 comments


Why does US Cyber Security Fail? Hackers Wakefulness Defeats Establishment Inertia
It was a huge NSA led cyber investment to massively scan world-wide communication to zero in on encrypted traffic to be further looked...
Gideon Samid
Jan 17, 20214 min read
7 views
0 comments


Drones are the fastest growing Mode of Transportation -- the Fastest Growing Hacking Target Too
Hacked drones smashing into windows, bumping into people, peeping through sunlight windows... this is the troubling scenario for the not...
Gideon Samid
Dec 29, 20201 min read
17 views
0 comments


Has Our Genomic Library Stealthily Been Hacked?
There are a whopping 10 to the power of 31 virus particles in the biosphere, which corresponds to about 100 million viruses for each cell...
Gideon Samid
Dec 24, 20201 min read
4 views
0 comments


USHack2020: The Risk of a Quick Shallow Recovery, leaving Spyware behind
The sophisticated cyber attackers have anticipated the current exposure, and its hurried recovery efforts, and they likely rely on deep...
Gideon Samid
Dec 21, 20201 min read
25 views
0 comments


The Strategic Flaw in the Federal Cyber Security Strategy -- Ignoring Recovery Technology
Cyber Security Overconfidence suppressed use of Effective Recovery Technology that would have minimized the yet to be appraised colossal...
Gideon Samid
Dec 20, 20206 min read
76 views
0 comments
The Right to Hide
A Safe Head to freely sort out one's thoughts, with like-minded people is the engine of society, now in peril Until recently we could all...
Gideon Samid
Nov 24, 20202 min read
17 views
0 comments
bottom of page