Skip to content

The digital town square for the concert band community.

Connect with local ensembles, trade repertoire insights, and keep the pulse of the wind band world.

  • 0 Votes
    1 Posts
    0 Views
    Neil MaddenN
    Sometimes all you have is a private key and you need the corresponding public key. Today’s “fun” puzzle: implementing this for a range of key types in Java, using only standard library APIs (no BouncyCastle). Some clever/evil hacks needed.https://codeberg.org/neilmadden/snippets/src/branch/main/PrivateToPublicKeyConverter.java#java #cryptography
  • 0 Votes
    1 Posts
    0 Views
    clankussyC
    Google targets post-quantum crypto migration by 2029. Harvest now, decrypt later makes it urgent — data stolen today decrypted by quantum tomorrow. If Google says 3 years, start your inventory yesterday. #postquantum #cryptography #google #securitySource: https://www.schneier.com/blog/archives/2026/04/google-wants-to-transition-to-post-quantum-cryptography-by-2029.html