#crypto Articles


Apple vs. the FBI

Originally written for the Syracuse University College of Engineering blog. In the wake of the tragic shooting in San Bernardino, many questions remain and people want answers. It seemed like a breakthrough in the investigation was imminent when the FBI got their hands on one of the shooters’ iPhone, only …

Understanding Dell’s Root Certificate Problem

Originally written for the Syracuse University College of Engineering blog. A recent discovery in the security community has researchers concerned about Dell devices. Some of these devices have been found to contain something known as a self signed root certificate. Installed by the manufacturer for advertising purposes, these certificates pose …

Digital Verses Analog Sanitization

As I promised in my previous blog post, I will try to explain the difference between digital and analog sanitization using an analogy better suited for the task. If you have no clue what I'm talking about, I recommend that you go and read that post. If you were hoping …

Is your data really gone? Explaining the challenges of data wiping.

Every now and again you hear on the news about some police investigation having a breakthrough by recovering deleted data off of an electronic device belonging to the possible suspect. You may also hear about professional criminals who recover sensitive information, such as credit card numbers, by sifting through the …