Why is using cryptographic applications so hard? Why do users have to learn to install and renew certificates, keys? Any set of instructions we can give a human can be turned into code and given to a machine. The Mathematical Mesh applies this principle to automate configuration of cryptographic applications including SSH, S/MIME and OpenPGP.
Protecting Data & Applied Crypto
Share With Your Community