Blog

Join us as we write about cybersecurity concepts, recent data breaches, and other exciting updates from the Bunkyr team.

Articles

Check back weekly for new posts!

Bunkyr launches Key Generation API

Announcing the public availability of our software-backed recovery encryption keys to power account recovery for non-custodial applications

Author profile picture
Reid Barton

Authentication vs. Encryption

Understanding the merits of authentication as well as its vulnerabilities, and how it compares to encryption

Author profile picture
Michael Brzozowski

Encryption basics: symmetric encryption

Some practical context for encryption, starting with symmetric encryption

Author profile picture
Reid Barton

MEGA's recent cryptography vulnerability

Researchers expose a vulnerability in end-to-end encrypted cloud storage provider MEGA

Author profile picture
Reid Barton

Electronic Health Records, privacy, and encryption

A look into current security and privacy practices in the EHR space, and how end-to-end encryption can help

Author profile picture
Michael Brzozowski

Bunkyr raises over $1M to bring frictionless security to developers and end users

Announcing our pre-seed round with participation from Y Combinator, Soma Capital, Protocol Labs, Justin Kan, and others

Author profile picture
Mike Lewis

API documentation now publicly available

Get started integrating Bunkyr into your application with 6 simple calls to our REST API

Author profile picture
Mike Lewis

Bunkyr vs. Magic

Examining Magic's non-custodial claims in depth, and comparing to Bunkyr's security

Author profile picture
Mike Lewis

Bunkyr is now backed by Y Combinator

We join YC's highly selective W22 batch; learn about the problem that got us here and how we're planning to solve it

Author profile picture
Michael Brzozowski

Bunkyr vs. Web3Auth/Torus

Comparing and contrasting Bunkyr with a competing key management solution

Author profile picture
Mike Lewis

Azure's recent AutoWarp vulnerability

How cloud vulnerabilities put even fully at-rest-encrypted data at risk

Author profile picture
Mike Lewis

Custody, security, and encryption in cryptocurrency wallets

Comparing the tradeoffs between security and ease of recovery for custodial and non-custodial wallets, and how Bunkyr can help bridge the gap

Author profile picture
Mike Lewis

Why should I encrypt my database?

Breaking down the advantages and disadvantages of common approaches to protecting your users' sensitive data against breaches, from plaintext defaults to end-to-end encryption

Author profile picture
Mike Lewis