Tim Callan Profile
Tim Callan

@TimCallan

Followers
436
Following
72
Media
1
Statuses
571

Chief Experience Officer at Sectigo (@SectigoHQ). Long time blogger about online security, branding, marketing, and technology.

Granger, Indiana
Joined January 2009
Don't wanna be here? Send us removal request.
@TimCallan
Tim Callan
1 day
Jason coins the term "entropy-aware governance" to describe the idea of using the degree of entropy it contains to measure the strength of a secret. This could be an objective, consistent metric that could be applied to standard practices and requirements.
0
0
0
@TimCallan
Tim Callan
3 days
Tim describes how the addition of an item to the CABF face-to-face meeting agenda blew up into a panicked and outraged online thread. We discuss what a more functional response would have looked like.
0
0
0
@TimCallan
Tim Callan
5 days
We continue our discussion of CPS misalignment by discussing the reasons for revocation as a remedy, its disadvantages, and the possibility of another solution that provides the same benefits at less cost.
0
0
0
@TimCallan
Tim Callan
8 days
We examine the circumstance where otherwise allowed practices are out of alignment with the stated practices in the relevant CPS. We discuss CA transparency and accountability, increased scrutiny of the CPS, and mass revocation.
0
0
0
@TimCallan
Tim Callan
14 days
We follow up on our discussion of the Get off My Lawn (GoTM) browser with Jason's adventure in creating his own custom root store.
0
0
0
@TimCallan
Tim Callan
22 days
We discuss Jason's code vibing journey to create the Get Off My Lawn! (GoTM) browser. We discussion SSL certificate information, EV indicators, and cookie handling.
0
0
0
@TimCallan
Tim Callan
24 days
We define CPS (Certificate Practices Statement) and explain the role it plays in both the WebPKI and private CAs.
0
0
0
@TimCallan
Tim Callan
26 days
"Code vibing" is using generative AI to create or improve working code. We share Jason's adventure using code vibing to create his own web browser.
0
0
0
@TimCallan
Tim Callan
1 month
The first CA distrust event of 2025 comes with two simultaneous CA distrusts. We give you the details.
0
0
0
@TimCallan
Tim Callan
1 month
For the first time ever, Jason and I record an episode from the floor of the CA/Browser Forum face-to-face meeting. We recap the themes of this meeting, and Jason gives his first impressions of a CABF Face-to-face.
0
0
0
@TimCallan
Tim Callan
1 month
In this episode we explain the potential for future quantum computers to break files signed today with RSA or ECC, called "Trust now, forge later.".
0
0
0
@TimCallan
Tim Callan
1 month
Jason programs a quantum computer! Jason describes his recent experience using Amazon Braket.
0
0
0
@TimCallan
Tim Callan
1 month
We explain the difference between two strategies of PQC implementation, which we call hybrid and composite.
0
0
0
@TimCallan
Tim Callan
2 months
In this episode Jason explains the fallacy of "playing chicken" with the Quantum Apocalypse. We discuss stack ranking and "eyes open" PQC risk decisions.
0
0
0
@TimCallan
Tim Callan
2 months
In this brief episode we explain why the problem that Shor's Algorithm poses to RSA and ECC can't be solved simply by increasing key size.
0
0
0
@TimCallan
Tim Callan
2 months
Wow. It's episode 500 of Root Causes. Jason and Tim talk about how the podcast has evolved in the past six years, how it has remained consistent, and the updates we're making to keep being a valuable resource for our listeners.
0
0
2
@TimCallan
Tim Callan
2 months
The recent Signal controversy highlights the importance of understanding what protections an E2EE messaging app provides, and what it does not.
0
0
1
@TimCallan
Tim Callan
2 months
The UK National Cyber Security Centre (NCSC) has released new PQC guidance. We take exception to the dates it gives and explain why.
0
0
0
@TimCallan
Tim Callan
2 months
Guest Sofia Celi (IETF, Brave) returns to discuss developments in post quantum cryptography. Sofia tells us about her candidate algorithm MAYO and what is happening with the NIST PQC onramp. We learn about KEM TLS and the status of PQC in IETF.
0
0
0
@TimCallan
Tim Callan
2 months
Gmail is now end-to-end encrypted for all recipients, regardless of the receiving client. We explain how Gmail accomplishes this trick.
0
0
1