Image source: https://www.venafi.com/blog/what-are-best-use-cases-symmetric-vs-asymmetric-encryption

Governments, militaries, banks and corporations rely on it. It’s responsible for securing most, if not all of your personal and financial data. There are special CPU instructions for it. It is the only cryptographic algorithm approved by the NSA.

We’re of course talking about the Advanced Encryption Standard (AES), the…

Light signals illuminating the ends of fiber optic wires

In our last article, we talked about TCP and UDP, the protocols that handle the delivery and verification of data sent over the internet. In this article we will shift our focus to hardware: how is data passed between devices?

Ethernet and Fiber Optics are probably terms you’ve heard before…

SafeHouse

Freedom through decentralization

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store