Revision: 20250323-0

White Papers

Security & Privacy for your Internet access (2024)

Publication: 20240620

Keywords: Internet Security & Privacy

[The] “Security & Privacy for your Internet access” white paper guides securing home networks and protecting digital assets. We emphasize the importance of network security for everyone, as cyber threats can lead to financial loss, data loss, privacy breaches, and operational disruptions. We discuss best practices such as using strong passwords, keeping devices and software up-to-date, enabling firewalls, and creating separate networks for IoT devices. We also recommend and discuss the use of secondary routers, leveraging advanced firewall capabilities, enhancing browser security and privacy, highlighting the value of password managers and the 3-2-1 backup strategy for data protection, and staying informed about cybersecurity threats and best practices.

Having done this as a presentation, I was asked about the tools that I use, so in no particular order: 1Password, TailScale, Firewalla, NextDNS, Ubiquiti Unifi, ControlD, Privacy Badger, uBlock Origin and Hagezi DNS Blocklists.

For the entire PDF document, please see:

Security & Privacy for your Internet access - Infotrend | Modernized Solutions

Blockchain Systems in the Age of Quantum Computers (2024)

Publication: 20240408

Keywords: Blockchain, Cryptography, Quantum Computing

In the digital age, cryptography is the cornerstone of data security, employing mathematical algorithms to prevent unauthorized access or alteration of data. The advent of quantum computing presents a potential threat to many existing cryptographic systems. This poses a significant concern for blockchain technology, which heavily relies on cryptography for its security. Post-quantum cryptography (PQC) is a burgeoning field aimed at developing cryptographic algorithms resistant to quantum computer-based attacks. Within the context of blockchain, several research domains emerge, including post-quantum signature schemes, consensus mechanisms, and privacy-enhancing techniques. This three-part exploration of cryptography, quantum computing, and blockchain technology underscores the need for continued research to secure, maintain integrity, and ensure privacy of blockchain systems in a potentially post-quantum world.