-
Podcast Feb 24, 2023
Root Causes 280: Did an AI Break CRYSTALS-Kyber?
Recent news reports might suggest that an AI-enhanced side attack has defeated the CRYSTALS-Kyber PQC algorithm.
-
Podcast Feb 20, 2023
Root Causes 279: ChatGPT Watermarking
In this episode we discuss the idea of "watermarking" ChatGPT content, including stenography, randomness, entropy, and how to destroy the watermarks.
-
Podcast Feb 17, 2023
Root Causes 278: Microsoft on Certificates and FIDO
Recent public discussion of FIDO and digital certificates reveal details of Microsoft's approach to consumer digital authentication.
-
Podcast Feb 13, 2023
Root Causes 277: Privacy Sandbox
Google has announced the Privacy Sandbox. In this episode we describe concepts like k-anonymity and differential privacy.
-
Podcast Feb 09, 2023
Root Causes 276: ChatGPT and Identity Reputation
People may use ChatGPT for reputation analysis, KYC, and other info about individuals and companies. This is subject to error and deliberate misdirection.
-
Podcast Feb 06, 2023
Root Causes 275: No Fly List Stolen
An attacker gained a copy of the full 2019 TSA No Fly list, including subject PII, all enabled by failures in digital identity and encryption.
-
Podcast Feb 03, 2023
Root Causes 274: New Quantum Readiness Law
The U.S. government has a new law requiring that government agencies create plans for migrating to PQC in response to threats from quantum computers.
-
Webinar Feb 02, 2023
Certificate Lifecycle Management and the Integrations Ecosystem
Certificate lifecycle management helps gain insight into and manage every part of a certificate’s lifecycle – from discovery, to issuance and cancellation.
-
Podcast Jan 30, 2023
Root Causes 273: A Deep Dive on CA Agnostic
We catalog the various ways a Certificate Lifecycle Management (CLM) system can be "CA agnostic."
-
Podcast Jan 27, 2023
Root Causes 272: OCSP's Privacy Problem
Concerns recently have been raised about OCSP real-time certificate checking and its potential to violate privacy.
-
Podcast Jan 23, 2023
Root Causes 271: A Whole Fleet of Identity-based Automotive Hacks
Manufacturers' dependence on non-secret "secrets" such as VIN and email address expose many vulnerabilities.
-
Podcast Jan 20, 2023
Root Causes 270: What Is the Difference Between KEM and PKE?
We explain the difference between Public Key Exchange (PKE) and Key Encapsulation Methods (KEM) and why we're moving from one to another.