Encrypting and Chunking Data in RSA Public Keys

This is part two of the RSA Public Key Manipulation series. See also Part 1: How to Hide Data Inside RSA Public Keys ...

January 29, 2026 · map[name:latedeployment]

How to Hide Data Inside RSA Public Keys

This is part one of the RSA Public Key Manipulation series. See also Part 2: Encrypting and Chunking Data in RSA Keys ...

January 29, 2026 · map[name:latedeployment]

SBOM as Messaging System

This is part four of the Certificate Transparency series. See also previous parts: Part 1: Certificate Transparency 101 Part 2: Certificate Transparency Info Leaks Part 3: Certificate Transparency as Communication Channel Introduction Described here is a way to leverage the infrastructure used to store SBOM (Software Bill of Materials) certificates in order to distribute messages via the sigstore database. ...

January 28, 2026 · map[name:latedeployment]

Certificate Transparency as Communication Channel

This is part three of the Certificate Transparency series. Introduction Described here is a way to leverage the infrastructure used to validate certificates in order to distribute messages through the Certificate Transparency Logs. ...

January 25, 2026 · map[name:latedeployment]

Certificate Transparency Info Leaks

This is part two of the Certificate Transparency series. Crtificate Transparency logs are leaking valuable information about companies due to either unfamiliarity or obliviousness from companies’ IT or DevOps teams. ...

January 19, 2026 · map[name:latedeployment]

Certificate Transparency 101

This is part one of the Certificate Transparency series. Certificate Transparency (CT) is a public, append-only logging system for TLS certificates. It was created to make certificate issuance observable so that mis-issuance can be detected quickly and independently. Instead of relying only on trust, CT lets anyone audit which certificates were issued for a domain and when they appeared in a public log. ...

January 19, 2026 · map[name:latedeployment]