Good ideas and conversation. No ads, no tracking. Login or Take a Tour!
From Bruce Schneier's blog I have learned that the weak point is almost always implementation; when vetted cryptography tools are employed no one bothers to attack them and rarely needs to. It is ridiculous how much easier it is to absorb an explanation when a stick figure presents it to you. You think you are reading a comic, before you know it you are reading Korean.never roll your own crypto libraries
this comic which teaches how AES works