News

The holder of the 1.1.1.1 certificates could potentially use them in active adversary-in-the-middle attacks that intercept ...
The DIIP (Digital Identity Interoperability Project / Pilot) under the EUDI framework has taken a more experimental stance than the strict eIDAS regulation itself. That’s where DIDs come in. Here’s ...
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS ...
Walrus Foundation’s Rebecca Simmonds explains how encryption and access control will take decentralized data management to ...