Menu Close

Articles on Cryptography

Displaying 1 - 20 of 43 articles

Several popular messaging apps, including Messenger, Signal, Telegram and WhatsApp, use end-to-end encryption. Open Rights Group/Flickr

Are private conversations truly private? A cybersecurity expert explains how end-to-end encryption protects you

End-to-end encryption provides strong protection for keeping your communications private, but not every messaging app uses it, and even some of the ones that do don’t have it turned on by default.
A look inside the quantum computing process. Quantum technology is a $142 billion opportunity that could employ 229,000 Canadians by 2040. (Photonic)

What quantum technology means for Canada’s future

Canada is well positioned to gain far-reaching economic and social benefits from the rapidly developing quantum industry, but it must act now to secure its success.
NFTs can be used to prove who created and who owns digital items like these images by the artist Beeple shown at an exhibition in Beijing. Nicolas Asfouri/AFP via Getty Images

How nonfungible tokens work and where they get their value – a cryptocurrency expert explains NFTs

NFTs are made the same way as crypto coins, but where every crypto coin is like every other, each NFT is a unique digital item – from images to sound files to text.
Close-up on the circuitry of the Vesuvius quantum computer, announced in 2012 by the Canadian firm D-Wave Systems. Steve Jurvetson/Flickr

Quantum computing, the new frontier of finance

On October 23 Google announced that it built a quantum computer thousands of times faster than classic computers. This could have immense impacts on finance, cryptography and other fields.
The American Survival Research Foundation offered a reward of $1,000 for cracking one of Thouless’s two codes within three years of his death. It was not claimed. Shutterstock.com

Cryptology from the crypt: how I cracked a 70-year-old coded message from beyond the grave

Computer capabilities have boosted our decryption technology to great heights. How will the future compare to a past, one in which codes were thought to be a means of communicating after death?
Embedded medical devices will continue to be vulnerable to cybersecurity threats. The pacemaker depicted is not made by Abbott’s. REUTERS/Fabrizio Bensch

Three reasons why pacemakers are vulnerable to hacking

Pacemakers are Internet of Things devices for the human body, but they’re still not particularly secure.

Top contributors

More