Posts

End-to-End Encryption: The Technology Protecting Your Private Messages

Image
         1. What Exactly Is End-to-End Encryption? We hear the term end-to-end encryption so often that it almost fades into the background. It appears in app descriptions, privacy policies, and headlines about digital security. Yet the idea behind it is simpler and more human than it sounds. At its core, end-to-end encryption is about trust. Or rather, about deciding who deserves it. Instead of trusting the internet, the network, or the company carrying a message, E2EE assumes the safest place for trust is at the two ends of a conversation. Messages travel through countless systems owned by different organizations before reaching their destination. Along the way, they can be copied, logged, or intercepted. For years, users unknowingly placed their private conversations into this open environment. End-to-end encryption changed that relationship. It created a private channel inside a public network - a way to communicate without exposing meaning to the systems ...

Quantum Entanglement: From Spooky Photons to Smart Circuits - The Journey to Nobel Glory

Image
“Spooky action at a distance.” That’s what Albert Einstein called it, half-joking, half-bewildered. Imagine you have two magical dice. Roll one on Earth and the other on Mars, and yet, both show the same number every single time. Sounds impossible? Welcome to the world of quantum physics. In our everyday life, things follow simple rules - a ball thrown up comes down, a switch turns on a light, and distance always weakens connection. But quantum physics lives in a completely different world the tiny world of atoms and particles. Here, objects don’t behave like solid things; they act more like waves, probabilities, and possibilities all mixed together. Things can be in two places at once, change just by being observed, and even seem to communicate without any signal. Particles can become mysteriously linked, like invisible twins sharing thoughts across space. If one particle spins a certain way, its twin instantly knows, no matter how far apart they are faster than even light could trave...

Digital Signatures

Image
                                                         In olden days we used to verify authenticity and legitimacy of a document using unique Fingerprint or a Signature. But as time changed ,the world shifted towards working with digital documents and data. Now the question arises about digitally signing any form of data on the internet . The solution to this problem is a digital signature (a digital proof) which is being attached along with the data being sent or received digitally . One of the famous Public Key algorithms of Cryptography - RSA can be used to generate Digital Signature .  Other algorithms are - ECDSA ( Elliptical curve digital signature algorithm ) ,  DSS (Digital Signature Standard) , ed25519 ( Edward Curve Digital Signature algorithm) RSA is a type of public key encryption algorithm( key...

The Women Achievers of Indian Aerospace

Image
Women are an integral part of society, be it in household chores or be it in a space mission in a country, women seem to slowly penetrate the glass ceiling and reach space. This wasn’t the case a decade ago, from the time of no computers to the time of AI and Virtual Reality, Science & Technology have come a long way. There is a lot of contribution from women in this field, but they all remain unrecognized and obscure. Women have reached great heights and to be a part of this change was very unprecedented. Nowadays the scenario of our society has changed, women are slowly becoming empowered and their accomplishments are turning historic. There are a lot of women across the globe who have raced against all odds like gender bias, gender inequality, and other such social stigmas, and have proved to be the initiators in the process of overcoming such odds. A vast sector of women is slowly coming forefront and fulfilling the persistent gap between the beliefs of society and the magic of...

The Inter Planetary File System - IPFS

Image
Photo Source The traditional web which was introduced earlier used a centralized network approach. This involves a user who requests data and receives it back from a single main server. Later a distributed network was used which can be thought of as the current web protocol (working of chrome) where the requested data is fetched from a collection of servers working in coordination. But both these approaches had flaws in them.  1. Failure of the main server or the master server would lead to data unavailability. When the server hosting the data stops hosting for some reason, the data won’t be available to the users. This could be problematic when a user needs data immediately and it is not available. In such cases, a user might incur a loss.  2. Censorship – Any government, country, or organization may restrict access to websites for reasons like – threat to National security, inappropriate content, secure information, etc. In these cases, data is again not available to the pu...