Apple Updates iMessage With a New ‘Post-Quantum’ Encryption Protocol

Apple has rolled out an update to iMessage encryption, the likes of which includes post-quantum protections that the company calls the “most significant cryptographic security upgrade” in the messenger’s history. The M3 MacBook Pro: Made Dark for Halloween In a blog post published Wednesday, Apple announced the arrival of PQ3, a new encryption protocol designed to … Read more

A Celebrated Cryptography-Breaking Algorithm Just Got an Upgrade

This is a job for LLL: Give it (or its brethren) a basis of a multidimensional lattice, and it’ll spit out a better one. This process is known as lattice basis reduction. What does this all have to do with cryptography? It turns out that the task of breaking a cryptographic system can, in some … Read more

The Linux Foundation and its partners are working on cryptography for the post-quantum world

We know the end of the line is in sight for classical cryptography. All the security encryption that protects our bank accounts, websites, and credit cards today will eventually be broken. That’s not just a threat; that’s the reality.  When Q-Day comes, which is the day quantum computers can break our existing encryption methods, we’ll … Read more

How a 27-Year-Old Codebreaker Busted the Myth of Bitcoin’s Anonymity

When Meiklejohn started college at Brown in 2004, she discovered cryptography. This branch of computer science appealed directly to her puzzle addiction—what was an encryption system, after all, but another secret language demanding to be deciphered? There was a maxim in cryptography, often referred to as Schneier’s law after the cryptographer Bruce Schneier. It asserted … Read more

This Clever New Idea Could Fix AirTag Stalking While Maximizing Privacy

Apple’s AirTags are meant to help you effortlessly find your keys or track your luggage. But the same features that make them easy to deploy and inconspicuous in your daily life have also allowed them to be abused as a sinister tracking tool that domestic abusers and criminals can use to stalk their targets. Over … Read more

The Comedy of Errors That Let China-Backed Hackers Steal Microsoft’s Signing Key

Microsoft stated in June {that a} China-backed hacking group had stolen a cryptographic key from the corporate’s techniques. This key allowed the attackers to entry cloud-based Outlook e-mail techniques for 25 organizations, together with a number of US authorities companies. On the time of the disclosure, nevertheless, Microsoft didn’t clarify how the hackers had been … Read more