Head of Cryptography Engineering at Tresorit, Péter Budai talks with Kim Carter about End to End Encryption (E2EE), backdoors, the scenarios where E2EE can be and should be used. IM, Voice over IP, Email scenarios, as well as interservice communication scenarios such as securing data in use with full memory encryption, CPU-based key storage, enclaves, cryptographic protocols (Secure multi-party computation and Homomorphic encryption). Péter and Kim discuss encrypting communications between microservices in the Cloud. Which ciphers to avoid and which to use along with how to find the right crypto library for your next software project.
Show Notes
Related Links
- Tresorit Cloud Storage + End-to-end Encryption
- Backdoors
- Tresorit Hacker Challenge
- Peter on LinkedIn
- Péter’s blog
- Application Layer Encryption for Cloud IEEE article
- Cloud Security SER show
- Network Security SER show
- Application Security SER show
- Docker Security SER show
- Holistic Info-Sec for Web Developers discusses client side crypto, ciphers, modes, libraries in the Web Applications chapter
- Post on GPG
- Guest Twitter
[…] Thanks to Kim Carter I had the honor to appear in one of SE-Radio’s regular podcasts, where we talk about the current issues and upcoming trends of cloud security and creating secure, encrypted applications. You can listen to it here. […]