Beyond Passwords: FIDO2 and WebAuthn in Practice

2019-12-12T13:30:29+00:00

Take a look at FIDO2 and WebAuthn in real life! We developed a proof of concept using those new authentication standards and conducted a user study to find out their perception by the general public. Those findings helped us form best practices when implementing WebAuthn in your own web application.

The World Wide Web of today is unthinkable without user authentication. A wide range of methods have been developed for this purpose, from text passwords over fingerp

Beyond Passwords: FIDO2 and WebAuthn in Practice 2019-12-12T13:30:29+00:00

Unraveling Kubernetes Security Tools

2019-08-15T14:51:01+00:00

When securing K8s based environments, many different issues arise. And there are even more tools that try to tackle these issues. Don't waste your time searching and checkout these open source Kubernetes Security Tools instead!

When securing K8s based environments many different issues arise—from checking the actual cluster configuration to configuring K8s features like Network Policies, Pod

Unraveling Kubernetes Security Tools 2019-08-15T14:51:01+00:00

OpenPGP: Create a New GnuPG Key (Part 1)

2019-03-12T12:44:44+00:00

This is the first part of the OpenPGP blog series. It briefly explains how to generate a new GnuPG key that can be used for encryption, signing and authentication. GnuPG is the open implementation of the OpenPGP standard defined in RFC 4880, allowing you to encrypt and sign data and to authenticate.

This is the first part of the OpenPGP blog series. It briefly explains how to generate a new GnuPG key that can be used for encryption, signing and authentication. <

OpenPGP: Create a New GnuPG Key (Part 1) 2019-03-12T12:44:44+00:00

Let’s encrypt the web! All of it.

2018-07-13T12:58:00+00:00

Are you serving your website via HTTPS yet? You really should and Let's Encrypt is here to help you get up to speed on that.

Does your website still run on plain HTTP? Would you like it to run on HTTPS? You should, because soon you might not have a choice anymore. The HTTPS saturation of th

Let’s encrypt the web! All of it. 2018-07-13T12:58:00+00:00

Application of Differential Privacy and Randomized Response in Big Data

2018-03-01T09:15:11+00:00

In this blog, I’ll explain some of the basic concepts of differential privacy and talk about how I’ve used it in my Bachelor’s Thesis.

Differential Privacy is a topic of growing interest in the world of Big Data. It is currently being deployed by tech giants like Google and Apple to gain knowledge ab

Application of Differential Privacy and Randomized Response in Big Data 2018-03-01T09:15:11+00:00