Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Alastria 3.0: the spanish blockchain consortium Artificial Intelligence: a companion to fight loneliness
  • Big Data
    • Can Big Data and IOT prevent motorcycle crashes? We’re talking about technology, will you join the conversation?
  • Cybersecurity
    • Web3 and the evolution of Internet Identity Cybersecurity Weekly Briefing July 25-31
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Gonzalo Álvarez Marañón

Writer, scientist and lecturer. Ambassador of the Innovation and Laboratory area at ElevenPaths.



Gonzalo Álvarez Marañón

Mathematics against cyber-crime: how to detect fraud, manipulation and cyber-attacks using Benford’s Law

In the early 20th Century, when calculators, computers and smartphones did not yet exist, scientists and engineers used tables of logarithms compiled in thick volumes for their calculations. For...
open badges
Gonzalo Álvarez Marañón

The Future of University Credentials Points Towards Blockchain And Open Badges

Do you want a university degree within 48 hours and without having to open a book, for less than €1,000? No problem. You don’t even need to go to...
Unravelling the Quantum Tangle of Cybersecurity: Quantum Computers, Quantum and Post-Quantum Cryptography
Gonzalo Álvarez Marañón

Unravelling the Quantum Tangle of Cybersecurity: Quantum Computers, Quantum and Post-Quantum Cryptography

Do you know what’ s the difference between quantum computing, quantum cryptography and post-quantum cryptography? Because to be honest, they have (almost) nothing to do with each other. They...
NFT Fever: The Latest Cryptocurrency Killing It Online
Gonzalo Álvarez Marañón

NFT Fever: The Latest Cryptocurrency Killing It Online

In May 2007, the digital artist known as Beeple decided to create and publish a new piece of artwork on the Internet every day. True to his word, he...
A Trillion-Dollar on Offer to the Puzzle Solver
Gonzalo Álvarez Marañón

A Trillion-Dollar on Offer to the Puzzle Solver

Are you a fan of mathematical puzzles? Well, here’s a lucrative one… but hard to beat! If you discover a method to crack the hashes used in Blockchain, you...
Nobody on The Internet Knows You Are A Dog, Even If You Use TLS Certificates
Gonzalo Álvarez Marañón

Nobody on The Internet Knows You Are A Dog, Even If You Use TLS Certificates

You may have noticed that most websites have a little padlock on them. If you click on it, a window will pop up stating that “the connection is secure”....
Functional Cryptography: The Alternative to Homomorphic Encryption for Performing Calculations on Encrypted Data
Gonzalo Álvarez Marañón

Functional Cryptography: The Alternative to Homomorphic Encryption for Performing Calculations on Encrypted Data

— Here are the exact coordinates of each operative deployed in the combat zone.— How much?­— 100.000.— That is too much.— And a code that displays on screen the...
Snitch Cryptography: How to Crack Tamper-Proof Devices
Gonzalo Álvarez Marañón

Snitch Cryptography: How to Crack Tamper-Proof Devices

Google’s Titan Security Key or YubiKey from Yubico are the ultimate trend in multi-factor authentication security. According to Google’s own website: «The keys have a hardware chip with firmware designed...
Plausibly Deniable Encryption or How to Reveal A Key Without Revealing It
Gonzalo Álvarez Marañón

Plausibly Deniable Encryption or How to Reveal A Key Without Revealing It

When the secret police arrested Andrea at the airport checkpoint, she thought it was a mere formality reserved for all foreign citizens. When they searched her luggage and found...
Hiding Keys Under the Mat: Governments Could Ensure Universal Insecurity
Gonzalo Álvarez Marañón

Hiding Keys Under the Mat: Governments Could Ensure Universal Insecurity

The doorbell rang. “Who will be ringing now?” asked Brittney Mills, as she struggled to get off the couch. Her eight months of pregnancy were beginning to hinder her...

Navegación de entradas

Volver a portada
1 2 3
More articles
  • Telefónica Tech

Popular

Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration