<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" >

<channel><title><![CDATA[Slava Gomzin - Blog]]></title><link><![CDATA[https://www.gomzin.com/blog]]></link><description><![CDATA[Blog]]></description><pubDate>Sat, 07 Mar 2026 04:19:08 -0600</pubDate><generator>Weebly</generator><item><title><![CDATA[AI Progress Makes Prompt Engineering Obsolete]]></title><link><![CDATA[https://www.gomzin.com/blog/ai-progress-makes-prompt-engineering-obsolete]]></link><comments><![CDATA[https://www.gomzin.com/blog/ai-progress-makes-prompt-engineering-obsolete#comments]]></comments><pubDate>Fri, 27 Feb 2026 14:55:24 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.gomzin.com/blog/ai-progress-makes-prompt-engineering-obsolete</guid><description><![CDATA[My new article is live on the RSAC Conference Blog: &ldquo;AI Progress Makes Prompt Engineering Obsolete.&rdquo;The short version: prompt engineering isn&rsquo;t disappearing&mdash;it&rsquo;s becoming a background skill as stronger chat models can generate prompts for specialist tools (including coding agents). But that doesn&rsquo;t remove the real responsibilities: stating clear requirements and verifying the result.Key takeaways:&bull; Prompt engineering shifts from a standalone craft to &ldq [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><span style="color:rgba(0, 0, 0, 0.9)">My new article is live on the RSAC Conference Blog: &ldquo;AI Progress Makes Prompt Engineering Obsolete.&rdquo;</span><br /><br /><span style="color:rgba(0, 0, 0, 0.9)">The short version: prompt engineering isn&rsquo;t disappearing&mdash;it&rsquo;s becoming a background skill as stronger chat models can generate prompts for specialist tools (including coding agents). But that doesn&rsquo;t remove the real responsibilities: stating clear requirements and verifying the result.</span><br /><br /><span style="color:rgba(0, 0, 0, 0.9)">Key takeaways:</span><br /><span style="color:rgba(0, 0, 0, 0.9)">&bull; Prompt engineering shifts from a standalone craft to &ldquo;invisible plumbing&rdquo; behind better models and better tooling.</span><br /><span style="color:rgba(0, 0, 0, 0.9)">&bull; &ldquo;Vibe coding&rdquo; still benefits from good inputs&mdash;clear requirements and explicit guardrails beat vague &ldquo;best practices.&rdquo;</span><br /><span style="color:rgba(0, 0, 0, 0.9)">&bull; Even when AI writes the prompt, accountability stays with the human: define what &ldquo;done&rdquo; means and verify outputs (tests, review, sanity checks).</span><br /><br /><span style="color:rgba(0, 0, 0, 0.9)">Read it here:</span><br /><a href="https://www.rsaconference.com/library/blog/ai-progress-makes-prompt-engineering-obsolete" target="_blank">https://www.rsaconference.com/library/blog/ai-progress-makes-prompt-engineering-obsolete</a><br /></div>]]></content:encoded></item><item><title><![CDATA[Before It’s Too Late: How to Begin Cybersecurity in Your Business]]></title><link><![CDATA[https://www.gomzin.com/blog/before-its-too-late-how-to-begin-cybersecurity-in-your-business]]></link><comments><![CDATA[https://www.gomzin.com/blog/before-its-too-late-how-to-begin-cybersecurity-in-your-business#comments]]></comments><pubDate>Tue, 13 Jan 2026 16:06:29 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.gomzin.com/blog/before-its-too-late-how-to-begin-cybersecurity-in-your-business</guid><description><![CDATA[This essay originally appeared in the&nbsp;RSA Conference BlogWhen someone launches a startup, or a new line of business in an established enterprise, at some point, sooner or later, they need to decide how to handle cybersecurity. They may have already postponed implementing cybersecurity several times, using excuses such as &ldquo;it does not make sense to spend on security before we get revenue&rdquo;, but they can&rsquo;t delay onboarding security into their organization forever. Contrary to [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><em style="color:rgb(34, 34, 34)">This essay originally appeared in the&nbsp;<a href="https://www.rsaconference.com/library/blog/before-its-too-late-how-to-begin-cybersecurity-in-your-business" target="_blank">RSA Conference Blog</a></em><br /><br /><span style="font-weight:inherit">When someone launches a startup, or a new line of business in an established enterprise, at some point, sooner or later, they need to decide how to handle cybersecurity. They may have already postponed implementing cybersecurity several times, using excuses such as &ldquo;it does not make sense to spend on security before we get revenue&rdquo;, but they can&rsquo;t delay onboarding security into their organization forever. Contrary to popular belief,&nbsp;</span><span style="font-weight:inherit">launching cybersecurity initiatives doesn't necessarily require extensive financial investment or vast resources. To begin, organizations need to answer several questions. While getting help from experienced professionals is ideal, they can certainly tackle this process themselves if that's not an option.<br /></span><br /><span style="font-weight:inherit">The first question to ask: &ldquo;Who is the person responsible for making decisions regarding security?&rdquo; Even if a high&#8209;ranking manager is tasked with this story, that person is not necessarily the one who should carry it out. Holding responsibility for a particular part of the business&mdash;say, technology&mdash;creates a conflict of interests, so the task should be escalated to a higher executive&mdash;or ideally,&nbsp;</span><span style="font-weight:inherit">the<em>&nbsp;business owner</em></span><span style="font-weight:inherit">&mdash;who cares about the long&#8209;term success of the business.&nbsp;</span><span style="font-weight:inherit">Putting the wrong person in charge of security is the number one security vulnerability in organizations.<br /></span><br />Assume for a moment that the decision&#8209;maker is also the one who cares deeply about security. The next four questions that must be answered are:<ul><li>How critical is the data (both organizational and customer data)?</li><li>How critical is the availability of the product or service (availability is defined below)?</li><li>Does the organization need to comply with any laws or industry regulations?</li><li>And finally: How important is the organization&rsquo;s reputation?</li></ul> <span style="font-weight:inherit"><br />The process of answering those questions is called risk assessment. This&nbsp;</span><span style="font-weight:inherit">can be done by the business owner and does not need to be done by a security professional</span><span style="font-weight:inherit">.<br /></span><br /><span style="font-weight:inherit">While advanced steps like&nbsp;</span><span style="font-weight:inherit">threat modeling and quantitative risk assessment are best left to professionals, an initial review offers crucial insights into future challenges and better prepares teams for expert collaboration. Now, let's explore those four questions.<br />&#8203;</span><br />First, review the available data&mdash;whether organizational, customer, or both&mdash;to determine its criticality to ongoing operations and to customers. If the business cannot continue operating once such data is lost or stolen&mdash;for example, payment data, healthcare records, or deal records&mdash;the answer to the first question is the data is critical, and adequate controls must be designed and implemented to protect confidentiality and integrity of the data.<br /><br /><span style="font-weight:inherit">The good news is that in many cases there are some laws or industry regulations that protect critical data, for example, Payment Card Industry Data Security Standards (PCI DSS) for payment data, or HIPAA for healthcare records, or General Data Protection Regulation (GDPR) for personally identifiable information (these regulations can help answer question three about compliance). But that&rsquo;s not always the case. For example, an organization might store transaction data that is not classified as sensitive under the regulations above but is, in fact, sensitive because it reveals extensive information about customers and business activities.&nbsp;</span><span style="font-weight:inherit">The lack of regulation in a particular business area does not mean the data is not attractive to hackers.<br /></span><br />Question two is also partially about the data but different aspects of it: availability. At this stage, it is crucial to understand the impact on the business if service to customers cannot be maintained and to define the maximum tolerable downtime. When a Service Level Agreement (SLA) exists with customers, this task is going to be simple as the required availability is typically defined therein. In the absence of an SLA&mdash;or when downtime parameters are not defined&mdash;the required availability should be estimated based on common sense. To clarify, examples of threats to availability include Distributed Denial of Service (DDoS) and ransomware attacks. Both can cause short or long-term downtime, so when continuous service is essential, adequate controls must be implemented. However, if the data is readily restorable&mdash;for example, statistical records that can be rebuilt from other sources&mdash;it may be acceptable to go easier on security protections.<br /><br />One important tip: note that the attack vectors (and therefore corresponding security controls) are different when it comes to protecting confidentiality and availability of the same data. For example, a sophisticated Data Loss Prevention (DLP) system can protect against information leaks, preventing attackers from exfiltrating data. But ransomware attackers don&rsquo;t care: need the data itself. What they do is delete the original data, replace it with an encrypted copy, and demand payment for the decryption key.<br />Question three on compliance&mdash;previously discussed briefly&mdash;if the data and environment fall under any relevant regulations, qualified assistance is recommended for two reasons: a formal assessment and certification process will be required, which is not trivial. More importantly, compliance requirements don&rsquo;t appear without reason: the data must be valuable to hackers, making the business a desirable target that is worth it to spend significant efforts and resources to break into their premises.<br /><br />Finally, the reputation question. Although protection company reputation seems to be obvious, it is amazing how many business owners ignore it. Even low&#8209;profile data that can be easily restored may still be targeted by attackers for various reasons, sometimes just for fun. Suppose attackers breach a development environment containing no production data, steal the contents, and publish them on so&#8209;called data leak or shame sites. Although the stolen data may have little intrinsic value, the mere fact of the breach can lead existing and potential customers to assume that their production data is equally vulnerable.&nbsp;<br /><br />Getting started with cybersecurity doesn&rsquo;t require perfection&mdash;just informed, intentional steps. By asking the right questions early, a solid foundation can be built to protect the business, its customers, and its reputation.</div>]]></content:encoded></item><item><title><![CDATA[Why Mainstream Retail Crypto Payments Still Don’t Exist]]></title><link><![CDATA[https://www.gomzin.com/blog/why-mainstream-retail-crypto-payments-still-dont-exist4518378]]></link><comments><![CDATA[https://www.gomzin.com/blog/why-mainstream-retail-crypto-payments-still-dont-exist4518378#comments]]></comments><pubDate>Mon, 03 Mar 2025 23:44:32 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.gomzin.com/blog/why-mainstream-retail-crypto-payments-still-dont-exist4518378</guid><description><![CDATA[This essay originally appeared in the&nbsp;RSA Conference BlogBitcoin recently celebrated its 16th anniversary with an&nbsp;all-time high price. One of its big promises among others was revolutionizing the way we pay for day-to-day purchases such as groceries.&nbsp;Crypto enthusiasts actively promoted moving away from plastic cards&mdash;which were conceived in the 1950s and increased consumer dependency on banks&mdash;to modern, cyber-friendly methods that allow independence from centralized fi [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><em style="color:rgb(34, 34, 34)">This essay originally appeared in the&nbsp;<a href="https://www.rsaconference.com/library/blog/why-mainstream-retail-crypto-payments-still-dont-exist" target="_blank">RSA Conference Blog</a></em><br /><br /><span style="font-weight:inherit">Bitcoin recently celebrated its 16th anniversary with an&nbsp;</span><a href="https://cointelegraph.com/news/bitcoin-price-80k-for-the-first-time-ever-new-inflation-adjusted-all-time-high" target="_blank">all-time high price</a><span style="font-weight:inherit">. One of its big promises among others was revolutionizing the way we pay for day-to-day purchases such as groceries.&nbsp;</span><span style="font-weight:inherit">Crypto enthusiasts actively promoted moving away from plastic cards&mdash;which were conceived in the 1950s and increased consumer dependency on banks&mdash;to modern, cyber-friendly methods that allow independence from centralized financial institutions</span><span style="font-weight:inherit">. But when you approach the checkout lane in your local grocery store, you won&rsquo;t see a &ldquo;pay with crypto&rdquo; sign.</span><br /><br /><span style="font-weight:700 !important">Merchant Challenges</span><br /><span style="font-weight:inherit">It&rsquo;s often argued that merchants are conservative about adopting new technology, and this is partly true.</span><span style="font-weight:inherit">&nbsp;The main reason for that is&nbsp;</span><a href="https://www.forrester.com/blogs/us-retail-industry-sales-and-profits-trends-2001-2022-steady-growth/" target="_blank">low net profit margins</a><span style="font-weight:inherit">&nbsp;that don&rsquo;t leave a lot of room for experimentation and investments in costly hardware and software. But that&rsquo;s not the reason, or at least not the only reason for mainstream merchants not offering crypto payments. If we look at other new tech such as artificial intelligence (AI), which is younger than Bitcoin, we will see that AI tools are being&nbsp;</span><a href="https://www.forbes.com/sites/blakemorgan/2019/03/04/the-20-best-examples-of-using-artificial-intelligence-for-retail-experiences/" target="_blank">enthusiastically embraced</a><span style="font-weight:inherit">&nbsp;by many retail chains. So why isn&rsquo;t crypto so fortunate?&nbsp;</span><br /><br />Merchants follow the technological trends for one of two reasons: operational cost reduction or demand from customers. The ideal situation is when a new tech provides for both, but this would be rather a rare, lucky case. Examples of technologies that represent both cases and a combination of them are self-checkout lanes, Apple Pay feature, and automatic product recognition respectively.<br /><br /><span style="font-weight:inherit">Self-checkout lanes dramatically reduce retailer costs by requiring only one attendant to oversee multiple stations instead of employing several cashiers.&nbsp;</span><span style="font-weight:inherit">Apple Pay, on the other hand, came as a trend from buyers requesting wider support for their favorite gadgets.&nbsp;</span><span style="font-weight:inherit">AI-based systems like automated product recognition are&nbsp;</span><span style="font-weight:inherit">both convenient for the buyers and reduce the average checkout time for merchants.</span><br /><br /><span style="font-weight:700 !important">Customer Incentives</span><br /><span style="font-weight:inherit">Unfortunately, crypto payments still can&rsquo;t find their place balancing between the merchant cost efficiency and customer demand. For retailers, they introduce hurdles like regulatory compliance uncertainties and require investments in implementation, maintenance, and security.</span><span style="font-weight:inherit">&nbsp;From the consumer side, the overall demand is low as the percentage of mainstream buyers who want to pay with crypto is still relatively&nbsp;</span><a href="https://www.pymnts.com/wp-content/uploads/2022/04/PYMNTS-The-US-Crypto-Consumer-April-2022.pdf" target="_blank">small</a><span style="font-weight:inherit">, but there is an even more important factor that prevents customers from actively lobbying for retail crypto payments: lack of financial incentive.</span><br /><br /><span style="font-weight:inherit">Over a&nbsp;</span><span style="font-weight:inherit">third of transactions at brick-and-mortar retailers--</span><span style="font-weight:inherit">don&rsquo;t cost the buyer anything, as merchants cover the processor fees for credit card payments.&nbsp;</span><span style="font-weight:inherit">Moreover, most credit card users benefit from paying by credit card as they get cashback from the bank that issued their card</span><span style="font-weight:inherit">--</span><span style="font-weight:inherit">up to 5% of the total transaction amount.&nbsp;</span><span style="font-weight:inherit">In contrast, crypto payments often require the sender to pay network fees, which can fluctuate widely depending on network congestion.&nbsp;</span><span style="font-weight:inherit">And even if a merchant decides to cover that fee, which will significantly increase its transaction cost while making it unpredictable because crypto fees are fluctuating, they will never be able to compete with cashback incentives.</span><br /><br /><span style="font-weight:inherit">The banks have a huge resource to pay out those cashbacks not just using the transaction processing fees paid by merchants but with endless late fees and interests on credit card balances paid by the cardholders themselves.&nbsp;</span><span style="font-weight:inherit">Merchants and crypto payment processors can&rsquo;t compete with banks in this area. They don&rsquo;t offer credit to customers and, therefore, can&rsquo;t offset costs through interest and late fees to fund large incentives.</span><span style="font-weight:inherit">&nbsp;Nevertheless, from the point of view of the average consumer, credit card payments still look financially more attractive than crypto payments.</span><br /><br /><span style="font-weight:700 !important">The Privacy Advantage</span><br />If there is a light at the end of the tunnel, it should come in the form of a unique benefit that crypto payments can provide to consumers that banks can&rsquo;t. Could privacy be the key to unlocking widespread crypto adoption?<br /><br /><span style="font-weight:inherit">Formally, credit card transactions are considered private, but in reality, it is courtesy of several companies such as payment processing bank</span><span style="font-weight:inherit">--</span><span style="font-weight:inherit">the one that works on the merchant side&nbsp;</span><span style="font-weight:inherit">--</span><span style="font-weight:inherit">and an issuer bank</span><span style="font-weight:inherit">--</span><span style="font-weight:inherit">the one that gives you the cards and sends you the monthly statements. These corporations are heavily regulated and their databases are vulnerable to cyberattacks. So, information about your transactions can either be subpoenaed by government organizations or stolen by hackers.</span><br /><br /><span style="font-weight:inherit">Crypto transactions offer enhanced privacy because they are processed on decentralized networks, removing the risk of centralized data breaches and possibility of disclosures to any third parties.&nbsp;</span><span style="font-weight:inherit">There are also privacy-focused cryptocurrencies such as Monero that, unlike Bitcoin or Ethereum, completely protect transaction history from anyone except for the wallet owner.&nbsp;</span><br /><br /><span style="font-weight:inherit">While freedom from interference is still not a big concern for many people,&nbsp;</span><span style="font-weight:inherit">as our lives shift into cyberspace, we become more aware of the importance of privacy and, the benefits of crypto payments may become evident to a critical mass of consumers, justifying any cost differences. This shift could occur sooner than we expect.</span><br /><br /></div>]]></content:encoded></item><item><title><![CDATA[Is the Crypto Space Dominated by a Small Group?]]></title><link><![CDATA[https://www.gomzin.com/blog/is-the-crypto-space-dominated-by-a-small-group]]></link><comments><![CDATA[https://www.gomzin.com/blog/is-the-crypto-space-dominated-by-a-small-group#comments]]></comments><pubDate>Sat, 22 Feb 2025 02:33:08 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.gomzin.com/blog/is-the-crypto-space-dominated-by-a-small-group</guid><description><![CDATA[Is the Crypto Space Dominated by a Small Group?&nbsp;In many ways, yes &ndash; especially on the investment side. Venture capital firms like Andreessen Horowitz, Polychain, Pantera, and a few others repeatedly appear as key early investors in numerous top projects, indicating a concentration of influence in the funding layer of crypto. This means the same funds often have significant token holdings and board influence across projects. For example, a16z not only funded Layer-1 chains (Solana, Ava [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><span style="color:rgba(0, 0, 0, 0.9)"><strong>Is the Crypto Space Dominated by a Small Group?</strong>&nbsp;<strong>In many ways, yes &ndash; especially on the investment side</strong>. Venture capital firms like Andreessen Horowitz, Polychain, Pantera, and a few others repeatedly appear as key early investors in numerous top projects, indicating a concentration of influence in the funding layer of crypto. This means the same funds often have significant token holdings and board influence across projects. For example, a16z not only funded Layer-1 chains (Solana, Avalanche, Sui, etc.) but also DeFi (Uniswap, Maker) and Web3 startups, giving it a broad sway over the industry&rsquo;s direction . Similarly, exchanges (Binance, Coinbase) by listing and investing, have shaped which projects gained prominence &ndash; their venture arms act as kingmakers, and in the case of Binance, it literally controls its own smart chain ecosystem&rsquo;s tokens.</span><br /><br /><span style="color:rgba(0, 0, 0, 0.9)"><strong>On the founder/creator side</strong>, the landscape is a bit more diverse than it might appear, but still with notable repeats. There are thousands of cryptocurrencies, yet many top projects trace back to a few influential founders or communities. The fact that Ethereum&rsquo;s alumni (Buterin, Wood, Hoskinson) went on to create other top blockchains shows a form of &ldquo;talent concentration&rdquo; &ndash; the expertise and credibility from one successful project can spawn multiple others. Web3 Foundation&rsquo;s Gavin Wood and Input Output&rsquo;s Charles Hoskinson are examples of individuals whose visions now power multiple major networks. In the stablecoin realm, the Tether team (iFinex) used their formula to launch other tokens (like LEO) &ndash; again a small group driving multiple assets.</span><br /><br /><span style="color:rgba(0, 0, 0, 0.9)">That said, the market is ultimately decentralized in ownership &ndash; Bitcoin and Ethereum, the top two, are widely held by millions with no controlling owner. And new innovations can and do emerge from outside this circle.</span><br /><br /><span style="color:rgba(0, 0, 0, 0.9)">It&rsquo;s also true that crypto remains open for new entrants &ndash; for example, memecoin phenomena like Shiba or Pepe came out of nowhere without backing from known elites, showing that outsiders can still break in. Yet, those are often the exception or short-lived in top rankings. Sustained top projects often eventually get support from or integration into the networks of those big players.</span><br /><br /><span style="color:rgba(0, 0, 0, 0.9)">In summary, <strong>the crypto space has a pattern of recurring players at the top</strong>: a handful of venture funds finance a large share of top projects, and certain founders have disproportionate influence by being behind multiple major coins. This doesn&rsquo;t mean there&rsquo;s a single cabal controlling everything &ndash; far from it, there&rsquo;s healthy competition and even rivalries (for example, different L1 teams compete despite sharing investors). But in terms of capital and expertise, the circle is relatively small. <strong>Crypto is &ldquo;dominated&rdquo; to an extent by these recurring players</strong>, in the sense that early-stage decisions (who gets funding, which ideas get resources) are often made by the same groups of people and companies.</span></div>]]></content:encoded></item><item><title><![CDATA[The Trouble With Telegram: The Platform May Not Be As Secure As It Claims To Be]]></title><link><![CDATA[https://www.gomzin.com/blog/the-trouble-with-telegram-the-platform-may-not-be-as-secure-as-it-claims-to-be6257951]]></link><comments><![CDATA[https://www.gomzin.com/blog/the-trouble-with-telegram-the-platform-may-not-be-as-secure-as-it-claims-to-be6257951#comments]]></comments><pubDate>Fri, 24 Jan 2025 15:26:19 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.gomzin.com/blog/the-trouble-with-telegram-the-platform-may-not-be-as-secure-as-it-claims-to-be6257951</guid><description><![CDATA[This essay originally appeared in the&nbsp;&#8203;IEEE Spectrum&nbsp;magazine  Pavel Durov, the founder of the chat app Telegram, was&nbsp;arrested&nbsp;in late August in France on charges that the company hasn&rsquo;t done enough to prevent malicious and illegal activity on the app.One might be tempted to think that Telegram&rsquo;s high level of data protection would&nbsp;prevent&nbsp;it from effectively addressing malicious activity on the platform: If Telegram can&rsquo;t read their users&rs [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><em style="color:rgb(34, 34, 34)">This essay originally appeared in the&nbsp;</em>&#8203;<a href="https://spectrum.ieee.org/telegram-security" target="_blank"><span>IEEE Spectrum</span><span style="color:rgba(0, 0, 0, 0.9)">&nbsp;</span><span style="color:rgba(0, 0, 0, 0.9)">magazine</span></a></div>  <div class="paragraph"><br /><a href="https://en.wikipedia.org/wiki/Pavel_Durov" target="_blank">Pavel Durov</a>, the founder of the chat app Telegram, was<a href="https://techcrunch.com/2024/08/29/france-formally-charges-telegram-founder-pavel-durov-over-organized-crime-on-app/" target="_blank">&nbsp;arrested</a>&nbsp;in late August in France on charges that the company hasn&rsquo;t done enough to prevent malicious and illegal activity on the app.<br /><br />One might be tempted to think that Telegram&rsquo;s high level of data protection would&nbsp;<a href="https://spectrum.ieee.org/encrypted-messaging-app" target="_blank">prevent</a>&nbsp;it from effectively addressing malicious activity on the platform: If Telegram can&rsquo;t read their users&rsquo; messages, they can&rsquo;t spot lawbreakers. Founded in 2013, Telegram has<a href="https://telegram.org/faq#q-how-secure-is-telegram" target="_blank">&nbsp;positioned</a>&nbsp;itself as a privacy-focused, secure messaging platform that prioritizes user freedom and&nbsp;<a href="https://spectrum.ieee.org/data-privacy" target="_blank">data protection</a>. Durov has<a href="https://x.com/durov/status/984759555052769280" target="_blank">&nbsp;emphasized</a>&nbsp;his strong commitment to privacy and free speech. In&nbsp;<a href="https://x.com/durov/status/1831984752359813503" target="_blank">a tweet</a>&nbsp;about the arrest, Durov wrote &ldquo;Our experience is shaped by our mission to protect our users in authoritarian regimes.&rdquo;<br /><br />However, a closer look at the platform&rsquo;s technology shows that privacy on Telegram is, at best, fragile.<br />First, while the Telegram&rsquo;s client-side code was made open source, the&nbsp;<a href="https://telegram.org/faq#q-can-i-get-telegram-39s-server-side-code" target="_blank">server-side code was never opened to the public</a>. This violates a widely embraced idea in cryptography known as&nbsp;<a href="https://en.wikipedia.org/wiki/Kerckhoffs%27s_principle" target="_blank">Kerckhoffs&rsquo;s principle</a>, which states that everything in a cryptosystem should be public knowledge, except for the secret keys themselves.<br /><br /><strong>Because the server code is closed source, there is no guarantee that Telegram does not just retain information forever.</strong><br /><br />While client code, which runs on users&rsquo; devices, is responsible for implementing private chats through&nbsp;<a href="https://en.wikipedia.org/wiki/End-to-end_encryption" target="_blank">end-to-end encryption</a>, the server code, which runs on Telegram&rsquo;s proprietary data centers,&nbsp;<em>could</em>&nbsp;do a lot of things that privacy-focused software is not supposed to do&mdash;for example, it can collect&nbsp;<a href="https://spectrum.ieee.org/emergency-alert-study-reveals-metadatas-better-side" target="_blank">metadata</a>, which includes statistics on user activities and geolocations, monitor and even eavesdrop on non-encrypted conversations, and report the information to third parties such as intelligence services or commercial corporations that could misuse it. Because the server code is closed source, there is no guarantee that Telegram does not just retain this information forever. If Telegram does, they could report that information when officially requested by someone, or even worse, provide an opportunity for hackers to leak it, even after you think you&rsquo;ve deleted it.<br /><br />Second, even Telegram&rsquo;s approach to encryption on the client side is not optimal for privacy-focused software: Telegram&rsquo;s communication&nbsp;<a href="https://telegram.org/faq?setln=ru#secret-chats" target="_blank">is not encrypted end-to-end by default</a>.<br /><br />Most online communication these days is encrypted, which means that the text you send from your browser to some website is not going through the Internet as clear text, as cryptographers call it, but encrypted&mdash;typically by the encryption standard called<a href="https://en.wikipedia.org/wiki/Transport_Layer_Security" target="_blank">&nbsp;Transport Layer Security</a>&nbsp;(TLS). While there are benefits to TLS&mdash;it encrypts network messages to prevent listeners to the Internet traffic from eavesdropping on the data being transmitted&mdash;there is also a downside. The data is encrypted only when it is transmitted over Internet routers, but it is decrypted by intermediate servers&mdash;for example, by the Telegram servers. This means that Telegram can read and retain all your conversations.<br /><br /><strong>Telegram inexplicably&nbsp;<a href="https://telegram.org/faq#q-how-is-telegram-different-from-whatsapp" target="_blank">claims</a>&nbsp;to be &ldquo;way more secure&rdquo; than WhatsApp, without offering any proof or reasonable justification.</strong><br /><br />Unlike TLS, end-to-end encryption ensures that the data is encrypted and decrypted using unique encryption keys that are known only to the sender and the recipient. For example, your chat message is encrypted inside your device, a mobile phone or laptop, and sent in its encrypted form through all the servers, including Telegram&rsquo;s servers, and decrypted only at the other end&mdash;inside the recipient&rsquo;s device.<br />End-to-end encryption by default would guarantee that Telegram cannot read your messages under any circumstances. In the case of end-to-end encryption, even the fact that the server source code remains proprietary should not affect the security of the encryption because the servers don&rsquo;t know the encryption keys.<br /><br />Yet because Telegram&rsquo;s end-to-end encryption is not enabled by default, many users may overlook this fact, leaving their communications vulnerable to interception or eavesdropping by Telegram personnel, intelligence services, or hackers. In contrast, another popular messaging service, WhatsApp, not only has end-to-end encryption enabled by default but also extends it to group chats&mdash;something Telegram lacks entirely. Despite this crucial difference, Telegram inexplicably&nbsp;<a href="https://telegram.org/faq#q-how-is-telegram-different-from-whatsapp" target="_blank">claims</a>&nbsp;to be &ldquo;way more secure&rdquo; than WhatsApp, without offering any proof or reasonable justification.<br /><br />It is also important to note that even end-to-end encryption does not prevent Telegram from collecting metadata, meaning that even though the text of your messages cannot be read, one can still see when you sent the message and who the recipient is.<br /><br />Since the server code is not open source, we don&rsquo;t know how Telegram manages metadata. Even with end-to-end encryption protecting the content of messages, metadata such as the time, geolocation, and identities of users can still be collected and analyzed, revealing patterns and relationships. This means that metadata can compromise privacy by exposing who is communicating, when, and where&mdash;even if the messages themselves remain encrypted and unreadable to outsiders.<br /><br />Third, for both end-to-end encrypted and standard chats, Telegram uses a proprietary protocol, called MTProto. Because MTProto is proprietary, the full implementation is not publicly available for scrutiny. Proprietary protocols may contain undisclosed vulnerabilities. MTProto has not undergone comprehensive independent security audits comparable to those performed on open-source protocols like the Signal Protocol (which WhatsApp also&nbsp;<a href="https://faq.whatsapp.com/820124435853543" target="_blank">uses</a>). So, even for so-called secret chats, there is no guarantee that the implementation is secure.<br />These technical shortcomings have real-life consequences.<br /><br /><strong>Freedom of speech and privacy are fundamental human rights, but we should be careful about how we use the tools that promise to preserve them.</strong><br /><br />Telegram was&nbsp;<a href="https://en.wikipedia.org/wiki/Blocking_of_Telegram_in_Russia" target="_blank">blocked</a>&nbsp;in Russia in April 2018 after the company refused to comply with a court order to provide Russian authorities with access to encryption keys, which would have allowed them to decrypt user messages. Despite the ban, Telegram remained accessible to many users in Russia through the use of VPNs and other circumvention tools. In June 2020, Russian authorities suddenly lifted the ban on Telegram. Russia stated that the decision was made in light of Telegram&rsquo;s willingness to assist in the fight against terrorism by blocking certain channels associated with terrorist activities, although Telegram continued to maintain its stance on user privacy.<br /><br />But in 2023, Russian opposition activists&nbsp;<a href="https://www.wired.com/story/the-kremlin-has-entered-the-chat/" target="_blank">reported</a>&nbsp;that their messages, although sent through secret chats, had been monitored and read by special forces, which led to their arrests. Telegram suggested that Russian authorities could have gotten access to the chats through a phone-hacking tool like&nbsp;<a href="https://cellebrite.com/en/home/" target="_blank">Cellebrite</a>, but the holes in Telegram&rsquo;s security make it impossible to know for sure.<br /><br />The struggle between privacy and governmental control is ongoing, and the balance between safeguarding human rights and national security remains a contentious issue. Freedom of speech and privacy are fundamental human rights, but we should be careful about how we use the tools that promise to preserve them. Signal and WhatsApp, unlike Telegram, both have end-to-end encryption enabled by default. In addition, Signal open-sources both the client- and server-side code. This allows security researchers to review the code and confirm that the software is secure and does not conduct surveillance on its users. A full open-source approach would also ensure that private chats are designed in such a way that they cannot be compromised.<br /><br />Telegram does not offer significantly better privacy or security than average communication services, like&nbsp;<a href="https://spectrum.ieee.org/tag/facebook">Facebook</a>&nbsp;Messenger. When it comes to the niche of truly privacy-centric products&mdash;where Telegram is trying hard to position itself&mdash;it&rsquo;s doubtful that Telegram can compete with Signal or even WhatsApp. While even those two aren&rsquo;t perfect in terms of privacy, they both have a leg up on that self-professed privacy stronghold Telegram.&nbsp;<br /><br /></div>]]></content:encoded></item><item><title><![CDATA[Why Mainstream Retail Crypto Payments Still Don’t Exist]]></title><link><![CDATA[https://www.gomzin.com/blog/why-mainstream-retail-crypto-payments-still-dont-exist]]></link><comments><![CDATA[https://www.gomzin.com/blog/why-mainstream-retail-crypto-payments-still-dont-exist#comments]]></comments><pubDate>Tue, 12 Nov 2024 23:12:34 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.gomzin.com/blog/why-mainstream-retail-crypto-payments-still-dont-exist</guid><description><![CDATA[My latest article published by the RSA Conference Blog: &ldquo;Why Mainstream Retail Crypto Payments Still Don&rsquo;t Exist.&rdquo; I delve into the security, privacy, and regulatory challenges preventing widespread adoption of crypto payments in mainstream retail.&nbsp;As cryptocurrencies gain popularity and their valuations soar, it&rsquo;s essential for the cybersecurity community to understand why their adoption in everyday transactions remains limited. The article delves into factors such  [...] ]]></description><content:encoded><![CDATA[<div class="paragraph">My latest article published by the RSA Conference Blog: <a href="https://www.rsaconference.com/library/blog/why-mainstream-retail-crypto-payments-still-dont-exist" target="_blank">&ldquo;Why Mainstream Retail Crypto Payments Still Don&rsquo;t Exist.&rdquo;</a> I delve into the security, privacy, and regulatory challenges preventing widespread adoption of crypto payments in mainstream retail.&nbsp;<br /><br />As cryptocurrencies gain popularity and their valuations soar, it&rsquo;s essential for the cybersecurity community to understand why their adoption in everyday transactions remains limited. The article delves into factors such as regulatory uncertainties, high implementation costs for merchants, lack of consumer demand, and the stronger financial incentives offered by traditional payment methods like credit cards.<br /><br />Importantly, the article also discusses how the unique privacy benefits of cryptocurrencies could drive future adoption. As concerns over digital privacy grow, these advantages may become significant enough to prompt a shift in consumer preferences and merchant offerings.<br /><br /><span style="font-weight:var(--artdeco-reset-typography-font-weight-bold)">#Cryptocurrency</span> <span style="font-weight:var(--artdeco-reset-typography-font-weight-bold)">#CryptoPayments</span> <span style="font-weight:var(--artdeco-reset-typography-font-weight-bold)">#Bitcoin</span> <span style="font-weight:var(--artdeco-reset-typography-font-weight-bold)">#Blockchain</span> <span style="font-weight:var(--artdeco-reset-typography-font-weight-bold)">#RetailTech</span> <span style="font-weight:var(--artdeco-reset-typography-font-weight-bold)">#Cybersecurity</span> <span style="font-weight:var(--artdeco-reset-typography-font-weight-bold)">#Privacy</span> <span style="font-weight:var(--artdeco-reset-typography-font-weight-bold)">#DigitalPayments</span> <span style="font-weight:var(--artdeco-reset-typography-font-weight-bold)">#FinTech</span> <span style="font-weight:var(--artdeco-reset-typography-font-weight-bold)">#RSAConference</span> <span style="font-weight:var(--artdeco-reset-typography-font-weight-bold)">#CryptoAdoption</span> <span style="font-weight:var(--artdeco-reset-typography-font-weight-bold)">#PaymentSolutions</span> <span style="font-weight:var(--artdeco-reset-typography-font-weight-bold)">#DataSecurity</span> <span style="font-weight:var(--artdeco-reset-typography-font-weight-bold)">#TechTrends</span> <span style="font-weight:var(--artdeco-reset-typography-font-weight-bold)">#Security</span></div>]]></content:encoded></item><item><title><![CDATA[Post-Quantum Payments: Is the Apocalypse Closer Than We Think?]]></title><link><![CDATA[https://www.gomzin.com/blog/post-quantum-payments-is-the-apocalypse-closer-than-we-think9893704]]></link><comments><![CDATA[https://www.gomzin.com/blog/post-quantum-payments-is-the-apocalypse-closer-than-we-think9893704#comments]]></comments><pubDate>Mon, 11 Nov 2024 16:21:49 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.gomzin.com/blog/post-quantum-payments-is-the-apocalypse-closer-than-we-think9893704</guid><description><![CDATA[This essay originally appeared in the RSA Conference Blog&#8203;  This article was inspired by my recent experience at the Black Hat and Defcon cybersecurity conferences. Quantum computing and post-quantum cryptography emerged as major topics, more prominently than ever before. One can say that this is because of the anticipated release of the NIST standard for post-quantum cryptographic algorithms which officially happened immediately after the conferences concluded. However, this&nbsp;release& [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><em style="color:rgb(34, 34, 34)">This essay originally appeared in the <a href="https://www.rsaconference.com/library/blog/post-quantum-payments-is-the-apocalypse-closer-than-we-think" target="_blank">RSA Conference Blog<br />&#8203;</a></em><br /></div>  <div class="paragraph"><span style="font-weight:inherit">This article was inspired by my recent experience at the Black Hat and Defcon cybersecurity conferences. Quantum computing and post-quantum cryptography emerged as major topics, more prominently than ever before. One can say that this is because of the anticipated release of the NIST standard for post-quantum cryptographic algorithms which officially happened immediately after the conferences concluded. However, this&nbsp;</span><a href="https://csrc.nist.gov/News/2024/postquantum-cryptography-fips-approved" target="_blank">release</a><span style="font-weight:inherit">&nbsp;might be just the tip of the iceberg, with significant developments likely hidden from public view. Now, let&rsquo;s start from the beginning and define what quantum computing is and why we should pay attention to it when it comes to a conversation about payments.&nbsp;</span><br /><br /><span style="font-weight:inherit">Unlike traditional computers, which use bits with value 0 or 1 as their elementary building blocks, quantum computing uses so-called qubits, which in addition to regular zeros and ones can enter a special state called superposition.&nbsp;</span><span style="font-weight:inherit">There are special algorithms that use superposition to dramatically speed up calculations which can take forever for regular computers, even supercomputers. One such algorithm, Shor&rsquo;s, claims the ability to crack public key encryption by solving the problems of factoring large integers and discrete logarithms, which are foundational to Rivest Shamir Adleman (RSA) and Elliptic Curve Cryptography (ECC). I say &ldquo;claims&rdquo; because Shor&rsquo;s algorithm has been theoretically proven and experimentally demonstrated on small quantum systems, but it has not yet been fully realized on large-scale quantum hardware capable of challenging current classical cryptographic systems.</span><br /><br />Unfortunately for mathematicians, and fortunately for all of us, quantum computers are not powerful enough yet to execute Shor&rsquo;s on a full scale sufficient to crack real RSA or ECC keys. But the threat is that such a development could happen at any moment. Remember what happened just less than two years ago with the first release of ChatGPT by OpenAI? Everyone was talking about AI, but no one was expecting a real-life application that can do much more than just chatting. That moment was rather a revolution than evolution. Why should we assume that the same cannot happen with quantum computing?<br /><br />There is one important difference however between quantum and AI. Companies such as OpenAI are motivated to do a fast release of their work to the public as this means&nbsp;<span style="color:rgb(0, 0, 0); font-weight:inherit">more investment and revenue for them</span>. Quantum computers, however, are not as directly tied to public engagement. National governments and their intelligence services may be even more interested in developing quantum computers than private corporations, and if they do such development and get good results, they will not necessarily publicize their achievements. Instead, they might try to exploit first and crack public communications, cryptocurrencies, and other technologies.<br /><br /><span style="font-weight:700 !important">How Is This Applied to Digital Payments?</span><br /><br />The first concern is cryptocurrencies, which rely entirely on public key encryption algorithms for security. If Elliptic Curves were cracked today, this would be an immediate crash of Bitcoin, Ethereum, Monero, and hundreds other crypto. All three aforementioned crypto networks, and their numerous forks and mimickers, are based on different flavors of the same ECC. The moment Shor&rsquo;s algorithm is successfully executed on real keys, the value of most cryptocurrencies could plummet to zero. But if the crackers decide to not make the discovery available to the public, they might first benefit from the ability to crack particular crypto wallets with large amounts.&nbsp;<br /><br /><span style="font-weight:inherit">But what about traditional payment technologies, like plastic cards, which still account for the majority of processed payments? The plastic payment card industry relatively recently made a full transition to EMV, also known as chip and pin, standard, which means that every payment card has a chip that is supposed to protect cardholder information and transactional data. Guess what is used to protect that data - correct,&nbsp;</span><a target="_blank">public key encryption</a><span style="font-weight:inherit">. In EMV, public key encryption algorithms such as RSA and ECC are employed to secure the data exchange between the card and the payment terminal. This ensures that even if the data were intercepted, it would be virtually impossible to decipher without the corresponding private key. One might assume that old magnetic stripe payment cards, with unencrypted data, are safe from cryptographic attacks. While magnetic stripe cards lack encryption, many legacy payment applications and online payment systems still rely on&nbsp;</span><span style="font-weight:inherit">Transport Layer Security</span><span style="font-weight:inherit">&nbsp;(TLS) to secure communications. These applications would be inherently vulnerable to quantum attacks.</span><br /><br />However, there is some good news too. Many modern payment systems use a technology called point-to-point encryption (P2PE), when the sensitive cardholder data is encrypted within the card reader device and decrypted only at the payment processor (bank). The most prevalent encryption scheme in P2PE is called DUKPT (Derived Unique Key Per Transaction) which uses symmetric ciphers such as AES (Advanced Encryption Standard). Symmetric algorithms are much more resilient to quantum attacks compared to public key encryption. There is an algorithm called Glover&rsquo;s that speeds up the brute-forcing of AES ciphers and reduces its security by two times. So, if AES uses a key with 256-bit length, its actual security will be reduced to 128-bit, which is still considered fairly secure today.<br /><br />&#8203;In conclusion, the advent of quantum computing poses a looming threat to the security foundations of both modern and traditional payment systems. While we may not yet be at the precipice of a cryptographic apocalypse, the potential for a sudden quantum leap in computational power demands immediate attention and preparation. Cryptocurrencies, as well as the broader financial industry, must begin transitioning to quantum-resistant algorithms to ensure the continued security and trust of digital and traditional payment systems alike. The time to act is now, before the quantum future becomes our quantum present.</div>]]></content:encoded></item><item><title><![CDATA[The Trouble With Telegram: The platform may not be as secure as it claims to be]]></title><link><![CDATA[https://www.gomzin.com/blog/the-trouble-with-telegram-the-platform-may-not-be-as-secure-as-it-claims-to-be]]></link><comments><![CDATA[https://www.gomzin.com/blog/the-trouble-with-telegram-the-platform-may-not-be-as-secure-as-it-claims-to-be#comments]]></comments><pubDate>Mon, 14 Oct 2024 21:37:38 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.gomzin.com/blog/the-trouble-with-telegram-the-platform-may-not-be-as-secure-as-it-claims-to-be</guid><description><![CDATA[Excited to share that my article on Telegram&rsquo;s security just got published in IEEE Spectrum magazine! &#8203;I dive into the encryption methods Telegram uses and what it means for user privacy.&nbsp;Check it out here: &#8203;spectrum.ieee.org/telegram-securityAlso available on Apple News:https://apple.news/AZbr4b1SmQPSZWzEXg6ZDeg&#8203;#Cybersecurity #Privacy #Encryption #Telegram #IEEESpectrum [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><span style="color:rgba(0, 0, 0, 0.9)">Excited to share that my article on Telegram&rsquo;s security just got published in</span><span style="color:rgba(0, 0, 0, 0.9)"> </span><span>IEEE Spectrum</span><span style="color:rgba(0, 0, 0, 0.9)"> </span><span style="color:rgba(0, 0, 0, 0.9)">magazine! <br />&#8203;I dive into the encryption methods Telegram uses and what it means for user privacy.&nbsp;</span><br /><br /><span style="color:rgba(0, 0, 0, 0.9)">Check it out here:</span><span style="color:rgba(0, 0, 0, 0.9)"> </span><br />&#8203;<a href="https://spectrum.ieee.org/telegram-security" target="_blank">spectrum.ieee.org/telegram-security</a><br /><br /><span style="color:rgba(0, 0, 0, 0.9)">Also available on Apple News:</span><br /><a href="https://apple.news/AZbr4b1SmQPSZWzEXg6ZDeg" target="_blank">https://apple.news/AZbr4b1SmQPSZWzEXg6ZDeg</a><br /><br />&#8203;<span style="color:rgb(231, 233, 234)">#Cybersecurity</span><span style="color:rgb(231, 233, 234)"> </span><span style="color:rgb(231, 233, 234)">#Privacy</span><span style="color:rgb(231, 233, 234)"> </span><span style="color:rgb(231, 233, 234)">#Encryption</span><span style="color:rgb(231, 233, 234)"> </span><span style="color:rgb(231, 233, 234)">#Telegram</span><span style="color:rgb(231, 233, 234)"> </span><span style="color:rgb(231, 233, 234)">#IEEESpectrum</span></div>]]></content:encoded></item><item><title><![CDATA[My Participation at the 15th NextGen Payments & RegTech Forum: Blockchain and Cryptocurrency Panel]]></title><link><![CDATA[https://www.gomzin.com/blog/my-participation-at-the-15th-nextgen-payments-regtech-forum-blockchain-and-cryptocurrency-panel]]></link><comments><![CDATA[https://www.gomzin.com/blog/my-participation-at-the-15th-nextgen-payments-regtech-forum-blockchain-and-cryptocurrency-panel#comments]]></comments><pubDate>Mon, 30 Sep 2024 14:11:04 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.gomzin.com/blog/my-participation-at-the-15th-nextgen-payments-regtech-forum-blockchain-and-cryptocurrency-panel</guid><description><![CDATA[&rsquo;m pleased to announce my participation as a speaker at the 15th NextGen Payments &amp; RegTech Forum on December 10-11, 2024, in Austin, Texas. I will be part of a panel discussion on &ldquo;Blockchain and Cryptocurrency Adoption,&rdquo; where we will discuss the current and future impacts of blockchain technology on financial systems.During the panel, I&rsquo;ll share insights from my experience in developing blockchain-based payment solutions and my work in payment security. The discuss [...] ]]></description><content:encoded><![CDATA[<div class="paragraph">&rsquo;m pleased to announce my participation as a speaker at the <a href="https://www.qubevents.com/15th-npf-usa" target="_blank">15th NextGen Payments &amp; RegTech Forum</a> on December 10-11, 2024, in Austin, Texas. I will be part of a panel discussion on <strong>&ldquo;Blockchain and Cryptocurrency Adoption,&rdquo;</strong> where we will discuss the current and future impacts of blockchain technology on financial systems.<br /><br />During the panel, I&rsquo;ll share insights from my experience in developing blockchain-based payment solutions and my work in payment security. The discussion will focus on both the challenges and opportunities businesses encounter when adopting these technologies.<br /></div>]]></content:encoded></item><item><title><![CDATA[Post-Quantum Payments: Is the Apocalypse Closer Than We Think?]]></title><link><![CDATA[https://www.gomzin.com/blog/post-quantum-payments-is-the-apocalypse-closer-than-we-think]]></link><comments><![CDATA[https://www.gomzin.com/blog/post-quantum-payments-is-the-apocalypse-closer-than-we-think#comments]]></comments><pubDate>Thu, 05 Sep 2024 18:44:07 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.gomzin.com/blog/post-quantum-payments-is-the-apocalypse-closer-than-we-think</guid><description><![CDATA[RSA Conference Blog just published my essay about post-quantum payments. The article explores the potential threats quantum computing poses to both cryptocurrencies and traditional payment systems, highlighting that while quantum computers aren&rsquo;t yet capable of breaking current encryption, a breakthrough could destabilize systems relying on public key encryption like RSA and ECC. [...] ]]></description><content:encoded><![CDATA[<div class="paragraph"><span style="color:rgba(0, 0, 0, 0.9)"><strong>RSA Conference Blog</strong> just <a href="https://www.rsaconference.com/library/blog/post-quantum-payments-is-the-apocalypse-closer-than-we-think" target="_blank">published</a> my essay about <strong>post-quantum payments</strong>. The article explores the potential threats quantum computing poses to both cryptocurrencies and traditional payment systems, highlighting that while quantum computers aren&rsquo;t yet capable of breaking current encryption, a breakthrough could destabilize systems relying on public key encryption like RSA and ECC.</span></div>]]></content:encoded></item></channel></rss>