Image source: https://hbr.org/2019/09/will-we-realize-blockchains-promise-of-decentralization

Anyone who hasn’t been living under a rock has heard of Bitcoin. People have been debating for a long time about whether Bitcoin is “just a fad.” We don’t claim to be economists nor mind-readers. …


Image source: https://www.venafi.com/blog/what-are-best-use-cases-symmetric-vs-asymmetric-encryption

Governments, militaries, banks and corporations rely on it. It’s responsible for securing most, if not all of your personal and financial data. There are special CPU instructions for it. It is the only cryptographic algorithm approved by the NSA.

We’re of course talking about the Advanced Encryption Standard (AES), the…


Image source: https://securedcommunications.com/download--secured-communications.html

In our many articles about how the internet works, we left out an important detail. Many common internet-facing applications secure data before it’s sent out into the world. But how? With an ingenious protocol known as TLS.

What is TLS?

In the olden days of the internet, communication was completely unencrypted. This meant…


Light signals illuminating the ends of fiber optic wires

In our last article, we talked about TCP and UDP, the protocols that handle the delivery and verification of data sent over the internet. In this article we will shift our focus to hardware: how is data passed between devices?

Ethernet and Fiber Optics are probably terms you’ve heard before…


This is another entry in a series of articles in which we talk about the fundamentals of how the internet works. We started with switches and routers and moved onto a bird’s eye view of the entire network stack.

In this article we will take a closer look at what…


In our last article we talked about switches and routers, two of the basic building blocks of the internet. In that article we mentioned that wires, switches and routers comprise the first three “layers” of a larger internet stack.

Today, we will zoom out and discuss what the other layers…


Switches and Routers are essential hardware pieces for the foundation of a network. In the beginning stages of the development of the computer, the need arose for computers to be able to talk to each other. …


A honeypot is a decoy target that attracts cyber attacks, distracting hackers from other important targets, and learns about how hackers do what they do.

In this article, we will discuss different types of honeypots and how they can help your business.

How honeypots work

A honeypot is supposed to imitate a real…


There are lots of things that need to be done to ensure the security of a system or network. Sometimes this process can be long, tedious, and confusing to set up for yourself. Oftentimes you will need a professional to handle things for you.

Here we will provide 3 easy…


There are many different types of cyber threats that a hacker can take advantage of to gain what they want. Some include phishing, malware, SQL injections, Denial-of-Service, or brute-force. All these terms and phrases can get confusing at times.

In this article, we break down for you the top 3…

SafeHouse

Freedom through decentralization

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store