Who is it?

Passport please. Identity control! Today’s cryptography goes far beyond the protection of confidentiality and, in a smaller measure, integrity. In our virtual world you don’t really know who you are talking to. If someone has intercepted your encrypted message and…

2 ways to appreciate the risks

We’ve already seen that one of the ways to decide if the risks are acceptable or not is the value of information. Let me remind you that the value is computed on four dimensions: the intrinsic value: what it cost…