Porto, Portugal
+351 960 245 977
fbnsantos@fbnsantos.com

Category: Cryptography

Robotics | IoT

Quantum Cryptography Is Unbreakable. So Is Human Ingenuity

Two basic types of encryption schemes are used on the internet today. One, known as symmetric-key cryptography, follows the same pattern that people have been using to send secret messages for thousands of years. If Alice wants to send Bob a secret message, they start by getting together somewhere they can’t be overheard and agree […]

Quantum Computers Could Crush Today’s Top Encryption in 15 Years

Quantum computers could bring about a quantum leap in processing power, with countless benefits for fields like data science and AI. But there’s also a dark side: this extra power will make it simple to crack the encryption keeping everything from our emails to our online banking secure. A recent report from the Global Risk Institute predicted that there is a one in seven chance vital cryptography tools will be rendered useless by 2026, rising… read more

66 Raspberry Pi Boards Make the World’s Biggest Cluster

When you think about the Raspberry Pi board you probably don’t think about GCHQ, but you might well think about computing clusters. In this instance, clusters of Pi.
Read more on MAKE
The post 66 Raspberry Pi Boards Make the World’s Biggest …

What Bitcoin Can Teach Us About Education

Bitcoin, the digital currency and network protocol, has commanded a great deal of attention lately. Investors have poured money into bitcoin related businesses. Many believe bitcoin has the same disruptive… read more

How to Be Secure With an Insecure Internet

Governments have been spying on their citizens since the dawn of time. From McCarthyism to PRISM, the scale of surveillance throughout history has varied according to the resources it took to dig up information on people.
Back in the 1950s, … Read M…

Top Tech and Startup News: 7 Things You Missed

Below is today’s top technology and startup news.
  1. $6200 Bitcoin Heist Threatens Android Operating System Hold onto your digital wallet. As expected, flaws in operating systems are being exploited to “pilfer” bitcoin. Google develop…

Kaspersky Labs explains: How to Protect Your Business from Cyber Attacks Part II

In the first part of this article, we told you about targeted cyber attacks and how cyber criminals penetrate corporate networks, attacking the computers of employees who use their desktops for social networking and other cyber-skiving.
 
Along …

The Next Crypto Battle

Initial skirmishes have provided some indication that the next cryptography (crypto) battle is heating up and is not far from a full-fledged call to arms. Insights from previous battles in this continuing war are useful in predicting how it could … R…