In December, we published our joint research with Microsoft and GitHub on performing static analysis of the top 5000 open source repositories from a cryptographic perspective https://lnkd.in/eb-38hMt That was the start. If you have access to source code, you too can work out if it is Post-Quantum safe and ready, but what if you don't? What if you had a vendor product whereby you need to ascertain if it is indeed doing cryptography in a modern(ish) way? Well this is what we are hoping to address in this release. CryptoMon is a service that allows the interception and analysis of over-the-wire TLS cryptography by Mark Carney and we hope that it is used by all to better understand what is happening at a cryptographic level. The more we know about what cryptography is in use all in supply chains, networks, devices, embedded devices and so much more, the better off we all are. https://lnkd.in/ehNeCj2D
Great job and you have killed a few startups and large corps along the way that aim to do exactly this. Kudos!
The best Daniel Cuthbert Mark Carney 👑
Pinging some potentially interested peeps: Bill Newhouse Evgeny Gervis Zygmunt Lozinski John Buselli Lory Piccirilli Thorpe Michael Osborne Benjamin Rodes Inbar Badian Itan Barmes Anne Ardon 👩🏻💻 Filipe Beato - I think these tools might be a handy tool for various activities I know are going on for PQC discovery; code and network scanning are two significant components of a good CBOM analysis coverage, and we'd love to hear people's thoughts. :)
Great work Daniel Cuthbert and Mark Carney - thanks for making CryptoMon available to anyone who wishes to use it.
DevOps | GitOps | Expert for Trumpet Winsocket on Windows 3.11
4moso we do not use the internet until we get these anti-quantum algos, right?