Author Archives: Rolf

Do we still need technical reference books?

Given the fact that AI tools like ChatGPT are able to generate texts on the fly, one may wonder whether we still need technical reference books (that are produced over an overlong period of time), or whether they may have … Continue reading

Posted in Uncategorized | Leave a comment

Signal Protocol in 1 Slide

Posted in Uncategorized | Leave a comment

E2EE Messaging in 1 Slide

Posted in Uncategorized | Leave a comment

Cyber Risk Management

A short article (column) entitled “How To Manage Cyber Risks – Lessons Learnt from Medical Science” will appear in the January 2023 issue of the IEEE Computer magazine. The article is co-authored by Andreas GrĂ¼nert, and it continues some lines … Continue reading

Posted in Uncategorized | Leave a comment

Lessons learnt from Log4j

The recent Log4j turmoil has revealed severe problems and structural difficulties in the way we develop and market software. Very frequently, some open source software components, like the Log4j library, are built into larger software products and may even become … Continue reading

Posted in Uncategorized | Leave a comment

Can a Lemon Market Remdey a Lemon Market?

It is commonly agreed that the market for cybersecurity products and services is what economists call a lemon market (according to the 1970 work of the economist George Akerlof who was jointly received the prestigious Nobel Memorial Prize in Economic … Continue reading

Posted in Uncategorized | Leave a comment

Is E2EE Conferencing Meaningful?

In these days, my new book entitled End-to-End Encrypted Messaging is being printed and prepared to be shipped. Due to this fact, but mainly due to the Corona crisis, I am often asked these days whether the various conferencing tools … Continue reading

Posted in Uncategorized | Leave a comment

New Book Released Soon

My new book about secure and end-to-end encrypted (E2EE) messaging will be released soon. It addresses E2EE messaging protocols, like OpenPGP and S/MIME, as well as OTR, Signal, iMessage, Wickr, Threema, Telegram, and many more. The core of the book … Continue reading

Posted in Uncategorized | Leave a comment

Intelligence-Driven Cyber Defense

In a 2015 article, I argued that conventional wisdom in information security management is deeply flawed, because it requires a risk-based approach knowing well that any form of risk analysis – be it quantitative or qualitative – is somehow arbitrary … Continue reading

Posted in Uncategorized | Leave a comment

CALL FOR QUESTIONS

I have added a cryptology blog named CRYPTOlog to the Web site of eSECURITY Technologies Rolf Oppliger (cryptolog.esecurity.ch). The aim is to answer questions related to cryptology that are of common interest. I am looking forward to receive many interesting … Continue reading

Posted in Uncategorized | Leave a comment