The Blog

Cryptography: Introduction
This has always been on the to-do list and I’ve never got around writing it. Let’s dive in and give you a taste of what is about to come.
Final part of phishing with EV
A lot has changed since I wrote the first part of phishing with EV and this is the right time to release the final part of this series. Let’s get on.
First part of phishing with EV
This post is intended for a technical audience interested in how an EV SSL certificate can be used as an effective phishing device. I won't be held liable if someone uses this post for unlawful intentions. No one was harmed in this demonstration. Let's get on.