In theory, it isn’t particularly new. The term zero trust has been around for more than 55 years. De-perimeterisation, the main concept behind Zero Trust Architecture, was defined and promoted on the Jericho Forums, which was founded 20 years ago. Even the management of risks associated with de-perimeterisation were discussed…


The EU Council says backdoor and security are compatible. The idea is fundamentally flawed.

Photo by Jason Dent on Unsplash

This is not the first and probably not the last time that the right to privacy and the fight against crime and terrorism are facing each other in the world political arena. …


The certificate revocation system, just like any other cyber security mechanisms is needless, as long as everything is going well, but becomes essential when things go wrong, namely a certificate has been compromised. A compromised certificate makes it possible for a malicious third party to create a service that acts…

Szilárd Pfeiffer

A free software fanatic developer, a security commited engineer, a free-culture enthusiastic jounalist, an agile believer manager.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store