News
Reputation is the key to our heart. We shoot the messenger because we expected better from them. The reason we place our trust in the messenger is simple: It is…
Blockchain is being used for tokenizing assets, such as real estate. Bitcoin and its siblings fascinate millions of people and in a world of negative interest rates are now seeing…
Please could you introduce yourself briefly and explain why you decided to become a part of Vereign’s story? Hi all, my name is Gospodin Bodurov and I am Head Of…
Please could you introduce yourself briefly Pete Herzog? I am the Managing Director of a security research nonprofit. I do OSSTMM, Hacker Highschool, advising, presenting, and a little go-go dancing…
A properly encrypted email will perfectly protect the virus or other cyberattack attachment from virus scanners and other defensive measures. And a signed email today only verifies that the content…
Online you need eIDAS signatures, which mean you need to 1. Get a Qualified Signature Creation Device (QSCD), 2. Find and employ a qualified trust service provider to manage the…
And if you believe the seal of the Certificate Authority (CA) you can be reasonably certain the person showing you this certificate is likely Georg. Unless of course the certificate…
So what is Vereign? Vereign is a trusted network that ensures all parties are genuine when sending emails and signing documents online. It’s for anyone who would like to trust…
Vereign has come up with a solution that adds a layer of trust, authenticity and ownership to your digital identity, email and documents. It is super easy to create your…
Below we have put together an overview of the main questions for you: When should we expect integration with Microsoft 365 and outlook? We are slightly dependent on Microsoft in…
In The Matrix, humanity is kept in a virtual reality that keeps them busy, distracted and emotionally involved. People laugh, like, love, hate and communicate while they are being drained…
One of these tales is that of Damocles. Intoxicated by convenience, wealth and power, he was oblivious to how fragile they can be until he found himself dining under a…
But this attitude is why many attempts at improving usability of cryptography in the past have primarily focused on making something cumbersome and annoying a little shinier. Care for an…
The average business user has 191 passwords. Private users tend to have less than that, and with different services. But all of them share one simple truth. Behind any password lies…
In this case, I am talking about wallets. They are best known from Bitcoin and other so-called cryptocurrencies. But the concept exists across all radically decentralised systems and many systems…
These schemes are getting more professional and harder to see through and their continued growth shows the returns still outweigh the costs. Business Email Compromise and CEO Fraud hit $12.5 billion last…
Our first application for the Vereign identity are email and documents. We made this choice because both are essential to professional and private users alike. Email connects almost four billion…
Documents have been around since the dawn of information technology and email is one of the original use cases that came into existence with the birth of the internet. While…
Blockchain technology offers distributed, verified records representing any kinds of data, including software programs, often referred to as smart contracts. Correctly applied, it provides a high degree of certainty that…
Blockchain was a hot topic during this year’s edition of the Free Software Legal and Licensing Workshop. Hosted by the Legal Network of the Free Software Foundation Europe (FSFE) it…
Blockchain technology is open source with global reach. To believe this puts it outside the reach of regulation is a momentous misconception which stems from taking the term “Smart Contract”…
That may seem like an odd sentiment, but is effectively the choice put forward in the debate between Proof of Work and Proof of Stake. Proof of Work is a…
It is essential for energy efficiency as it describes why any transfer of one form of energy into another will always incur loss. Which means it is impossible to build…
China, Russia, US elections, disinformation campaigns, state sponsored trolls, social bots and cyber mobbing have forcefully dismantled the romantic early notions held for the Internet. The Internet does not care…