We basically gave up on going to startup events for now. I know It’s not good for marketing or when you look for equity investment. We just got tired of trying to explain what a “platform” is good for. Everyone expects a flashy demo or screenshot of your app.
Continue reading Do you have screenshots of your crypto platform? →
Public cloud providers have absolute control over our data, applications, everything we do on their cloud platform. Independent key management lowers users’ risk exposure and as such is in the interest of cloud providers. Well, Amazon AWS has different thoughts.
Continue reading Does Amazon Want To Control All Encryption Keys? →
We pushed hard to extend our Private Spaces and make them a great choice for companies to connect roaming users (and their own devices, while providing a high-level of security for BYOD policies).
Continue reading VPN for Companies – “Bring Your Own Device” Made Easy →
From supercomputers to IoT – processors (or chips) are everywhere. Computer chips protecting our privacy and security would first travel the world to get designed, fabricated, and personalized. Even if we had an unbreakable encryption algorithm, it may be defeated by its manufacturing. Let’s exploit superpowers and their influence to create a practical unbreakable encryption.
Continue reading Unbreakable Encryption with Secure Hardware and Geopolitics →
"Any sufficiently advanced technology is indistinguishable from magic." A. C. Clark