In light of documented TLS vulnerabilities and implementation bugs, understanding known attack vectors becomes a necessity.
“You know, if you have something really important, write it out and have it delivered by courier, the old-fashioned way. Because I’ll tell you what: No computer is safe (…) I don’t care what they say.”
President-Elect Donald Trump
In the waning days of the fading Obama presidency, plenty of questions surfaced about Russia’s involvement with the hacks of the DNC and election systems. Electronic evidence can be easily manipulated.
There is more to it than just electronic evidence.
In a research paper titled “Majority is not Enough: Bitcoin Mining is Vulnerable“, Professor Emin Gün Sirer and Dr. Ittay Eyal of the Department of Computer Science at Cornell University, revealed the Selfish Mining attack on Bitcoin’s blockchain back in 2014.
Are you concerned about the security of data transmissions in which your web server participates day in and day out? Passwords, user names, credit card numbers, and other sensitive private communications on the Internet can easily be compromised unless you actively take precautionary measures and preempt the most common exploits by means of modern cryptography. Your users trust that you will protect them. The only question is: how do you measure success?