-
AWS re:Invent 2025: insights and key takeways
07/12/2025 · 34 min read · aws re:invent conference cybersecurity cloud ai agentic quantum-computing networking computing storage serverless ·
In this article, I take you with me to the AWS re:Invent 2025 conference I attended in Las Vegas. You’ll see an overview of the sessions I attended along with the key takeaways from this intense week of learning, practising …
Read More -
Getting started with post-quantum cryptography: the ML-KEM key exchange
03/07/2025 · 19 min read · cybersecurity quantum-physics quantum-computer qubit cryptography post-quantum-cryptography pqc lattices mlwe kem kyber ml-kem ·
In this article, I invite you to discover the wonderful world of post-quantum cryptography with the Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) key exchange algorithm, also known as Kyber and standardized in August …
Read More -

In this article, I invite you to discover the MASQUE proxies, which enable the proxification of Web traffic relying on HTTP/3 or even the tunneling of communications with HTTP/3. MASQUE provides compatibility of the proxy or VPN …
Read More -
Automating the protection of a network from denial of service with RTBH, NetFlow, goBGP and FastNetMon

In this article, I will introduce Remotely-Triggered Black Hole (RTBH), a technology based on the Border Gateway Protocol (BGP) routing protocol and designed to provide the ability to block unwanted network traffic in order to …
Read More -
Decoding TLS Encrypted Client Hello extension
01/12/2023 (updated on 10/03/2025) · 12 min read · cybersecurity cryptography privacy tls ech hpke sni ·
In this article, I would like to introduce you to Encrypted Client Hello (ECH), an extension of the Transport Layer Security (TLS) network protocol designed to guarantee enhanced privacy. The main idea is to make certain Web …
Read More