«to Polynom

Blogs & Announcements

  • How Quantum Computing Threatens SaaS Businesses

    OpenVC Article  |  15 Min Read

    The year is 2027. Quantum computers (QCs) have finally become a reality and are far more powerful than anyone could have imagined. AI-enabled QCs can solve problems that ...



    Read at OpenVC »
  • Quantum State Transfer Protocols: A Giant Leap Forward?

    Jeff Phillips  |  5 Min Read

    The latest big development in quantum computing is the ability to directly transfer quantum bits (qubits) between quantum computer microchip modules. This was demonstrated by ...



    Continue Reading »
  • Quantum Computing & Threat to Existing Cryptography

    Jeff Phillips  |  5 Min Read

    Quantum computing is an exponentially advancing field of computer science that exploits the principles of quantum mechanics to perform computations that are intractable on ...



    Continue Reading »
  • Improvements in Quantum Computing Error Correction

    Jeff Phillips  |  5 Min Read

    There has been significant progress in developing QEC techniques in recent years. These techniques allow quantum computers to correct errors and remain accurate even with significant noise ...



    Continue Reading »
  • Polynom Security Whitepaper - v1.93

    Jeff Phillips   |   120 Min Read

    Learn more about what's in store for the coming months, years, and decades. Our team is committed to delivering ...



    Read the Whitepaper »
  • AES: One of the Most Secure Algorithms in Existence

    Jeff Phillips  |  10 Min Read

    The Advanced Encryption Standard (AES) is a widely adopted encryption algorithm crucial in securing digital communications, sensitive data, and information systems ...



    Continue Reading »
  • Quantum Computing & Threat to Existing Cryptography

    Jeff Phillips  |  5 Min Read

    Quantum computing is an exponentially advancing field of computer science that exploits the principles of quantum mechanics to perform computations that are intractable on classical computers ...



    Continue Reading »
  • Lattice-Based Cryptography: A PQC Solution

    Jeff Phillips  |  5 Min Read

    Lattice-based cryptography is a type of cryptography that is designed to be secure even against quantum computers. Lattice-based cryptography uses the difficulty of solving certain problems on lattices ...



    Continue Reading »
  • Open Source Security Implications - Emperor's New Clothes

    Jeff Phillips  |  5 Min Read

    Open-source software has become ubiquitous in the digital world, lauded for its transparency, flexibility, and cost-effectiveness ...



    Continue Reading »
  • A Peek Into Discord's Malware and Sinister Algorithms

    Jeff Phillips  |  20 Min Read

    Discord lurks in the flickering shadows of the internet, where pixels whisper secrets and whispers morph into malware ...



    Continue Reading »
  • Telegram and Russia's FSB: An Uncomfortable Relationship

    Jeff Phillips  |  20 Min Read

    Telegram is the world's fourth largest instant messaging and VoIP app (after WhatsApp, WeChat, and Facebook Messenger), but the security ...



    Continue Reading »
  • What's Up with WhatsApp? – Most Used VoIP Security Critique

    Jeff Phillips  |  15 Min Read

    WhatsApp is the world's largest VoIP app. As of August 2023, it had over 2.74 billion active users worldwide[1]. It is used by people in over 180 ...



    Continue Reading »
  • An Overview of Signal's Risk Profile and Critical Vulnerabilities

    Jeff Phillips  |  10 Min Read

    Signal is a popular messaging app often touted as a secure, end-to-end encrypted platform created by respected cryptographer ...



    Continue Reading »
  • Credential Theft in Collaboration Applications

    Jeff Phillips  |  5 Min Read

    Collaboration applications (i.e., Zoom, Microsoft Teams, Slack, Discord, etc.) have become essential tools for businesses of all sizes ...



    Continue Reading »
  • How Graphatars™ Can Revolutionize Digital Identities

    Jeff Phillips   |   10 Min Read

    Graphatars are generated from a unique post-quantum cryptographic-generated identifier and are not associated with PIIs. This pioneering cryptographic approach makes Graphatars ...



    Continue Reading »
  • Quantum Rooms™ and Ephemeral Messaging in the Datasphere

    Jeff Phillips   |   10 Min Read

    The datasphere is a Byzantine system encompassing all types of data, networks, and their dynamic interactions with human groups and norms ...



    Continue Reading »
  • PolynomTM: New PQC Security Standard in Virtual Data Rooms

    Jeff Phillips  |  5 Min Read

    For many years, virtual data rooms (VDRs) have been the standard for sharing confidential documents on a secure online platform. Traditional data rooms and VDRs allow sellers or ...



    Continue Reading »
  • Self-Hosting Hardware: Intel NUC 13 Pro & Desktop Editions

    Jeff Phillips  |  5 Min Read

    Recently, there has been a growing trend of individuals and small businesses self-hosting their data services. This is due to several factors, including the increasing ...



    Continue Reading »
  • How Graphatars™ Can Revolutionize Digital Identities

    Jeff Phillips   |   10 Min Read

    Graphatars are generated from a unique post-quantum cryptographic-generated identifier and are not associated with PIIs. This pioneering cryptographic approach makes Graphatars ...



    Continue Reading »
  • Quantum Rooms™ and Ephemeral Messaging in the Datasphere

    Jeff Phillips   |   10 Min Read

    The datasphere is a Byzantine system encompassing all types of data, networks, and their dynamic interactions with human groups and norms ...



    Continue Reading »
  • Collaboration for Freedom - iVOL & Code Siren, LLC Initiative

    Jeff Phillips   |   3 Min Read

    The Institute for Voices of Liberty and Code Siren, LLC to Provide Free Secure Communications to the Freedom-Seeking People of Iran ...



    Continue Reading »
  • PolynomTM: New PQC Security Standard in Virtual Data Rooms

    Jeff Phillips  |  5 Min Read

    For many years, virtual data rooms (VDRs) have been the standard for sharing confidential documents on a secure online platform. Traditional data rooms and VDRs allow sellers or ...



    Continue Reading »