privacy Today's kids need end-to-end encryption. Remember: the apocryphal ostrich who buries its head in the sand only thinks it can't be seen; it makes precisely the same mistake that we do when we plan our kids' daily routines in plaintext on servers owned by advertisers and snooped by states.
Blockchain ETHWaterloo2 Hackathon - Season Finale! What a busy few months it's been for us at NuCypher. After a stretch in Europe for ETHBerlin, Web3 Summit, and Berlin Blockchain Week, we parted ways before quickly reuniting
proxy re-encryption What exactly do we mean by access revocation? The topic of access revocation tends to be a confusing one in the context of encryption and data sharing. In our presentations, when we mention the ease of access revocation with proxy re-encryption as one of our sources of value...