Technology

How does key recoverability work?
Intel Software Guard Extensions (SGX) is a new technology that enables so-called secure enclaves that are processes that are protected from processes runnin...
Tue, 29 May, 2018 at 9:55 AM
Do we need Hyker when there are blockchains?
Blockchains are important and disruptive. They establish trust between parties and transaction authenticity, without having a central authority. But smart co...
Thu, 17 May, 2018 at 5:10 PM
Where cryptography fits with network defence approaches. Alternative or complementary?
For a secure system, there are a number of security categories that needs to be addressed.  The most important: Endpoint device protection User access a...
Thu, 17 May, 2018 at 1:23 PM
How does key revocation work?
There are 2 scenarios for key revocation in Hyker First case (public keys used for identification of users/devices): Public key revocation in Hyker works ve...
Wed, 16 May, 2018 at 10:10 AM
Have Hyker been audited?
Our official accreditation is still in the making, but all algorithms we use are compliant with NIST and FIPS.  We have been audited by Combitech Cyber Sec...
Wed, 16 May, 2018 at 2:00 PM
Hyker vs Network Security?
Hyker is not network defence, Hyker protects data anywhere, over time, in transfer and at rest. For a secure system, there are a number of security categor...
Wed, 16 May, 2018 at 10:13 AM
Hyker vs Signal?
The end-to-end secure apps Signal and WhatsApp (and others) are based upon the Signal Protocol. Hyker differs from Signal because of the different purposes ...
Wed, 16 May, 2018 at 10:12 AM
Does Hyker require or use any specific hardware?
Hyker does not require hardware. Hyker is also agnostic to all communication protocols, platforms and devices, if it has enough processing capabilities. Ma...
Wed, 16 May, 2018 at 10:15 AM
What does Hyker mean with Data Security?
"Data Security" is one of those buzzwords that people use for many different solutions. It is not a big surprise since most people in IT talk abou...
Thu, 17 May, 2018 at 1:22 PM
What cryptographic functions are used?
AES-GCM using 256 bit keys 128 bit tags 96 bit IVs ECDSA using P-256 keys SHA-256 hashing Key Wrapping The protocol uses ECDH key agree...
Mon, 11 Jun, 2018 at 3:28 PM