Security

A peek at IPC and RPC / Coup d’oeil à l’IPC et au RPC

In computer science, we like to run programs. We write lines of codes that take in some input, feed it to a set of gears for computation, and spit out a result. This is hardly news. But what is not clear at first when you’re a programmer in training is all the complexity this sentence hides. To better understand this, let’s talk about washing dishes, doing some shopping and going to the laundry mat.

Read More »A peek at IPC and RPC / Coup d’oeil à l’IPC et au RPC

Data & Security/Donnée & Sécurité #2: Asymmetric Ciphers/Chiffrement asymétrique

Last time, I discussed how symmetric cryptography has long been in use for transmitting secret messages. Despite all of its advantages, we did point out some problems with symmetric ciphers: they require you to safely exchange keys and some can now be easily broken thanks to the newest technologies in computer science. Today, I’ll talk more about the counterpart: asymmetric cryptography. I’ll discuss its pros and cons compared to symmetric cryptography and I’ll also give a very rough picture of a possible game-changer: quantum cryptography.

Read More »Data & Security/Donnée & Sécurité #2: Asymmetric Ciphers/Chiffrement asymétrique

Data & Security/Donnée & Sécurité #1: Symmetric Ciphers / Chiffrement symétrique

Today, we live in a world of data. It is great, because it helps Google perform amazing searches and retrieve exactly the info you want; because it allows Facebook and Instagram to show you news that are relevant for you; because it makes it easy to connect to hundreds of applications and enjoy thousands of new technologies. But, at the same time, some scammers are currently take advantage of the Covid pandemic to trick people into giving out info and money with phishing, possible medical data leaks from the French to the American government have been pointed out and there are more and more scandals about hackers attacking hospitals or banks mixing up their clients data and having them stolen.

Read More »Data & Security/Donnée & Sécurité #1: Symmetric Ciphers / Chiffrement symétrique