Join us as we write about cybersecurity concepts, recent data breaches, and other exciting updates from the Bunkyr team.
Check back weekly for new posts!
MEGA's recent cryptography vulnerability
Researchers expose a vulnerability in end-to-end encrypted cloud storage provider MEGA
Electronic Health Records, privacy, and encryption
A look into current security and privacy practices in the EHR space, and how end-to-end encryption can help
Bunkyr raises over $1M to bring frictionless security to developers and end users
Announcing our pre-seed round with participation from Y Combinator, Soma Capital, Protocol Labs, Justin Kan, and others
API documentation now publicly available
Get started integrating Bunkyr into your application with 6 simple calls to our REST API
Bunkyr vs. Magic
Examining Magic's non-custodial claims in depth, and comparing to Bunkyr's security
Bunkyr is now backed by Y Combinator
We join YC's highly selective W22 batch; learn about the problem that got us here and how we're planning to solve it
Bunkyr vs. Web3Auth/Torus
Comparing and contrasting Bunkyr with a competing key management solution
Azure's recent AutoWarp vulnerability
How cloud vulnerabilities put even fully at-rest-encrypted data at risk
Custody, security, and encryption in cryptocurrency wallets
Comparing the tradeoffs between security and ease of recovery for custodial and non-custodial wallets, and how Bunkyr can help bridge the gap
Why should I encrypt my database?
Breaking down the advantages and disadvantages of common approaches to protecting your users' sensitive data against breaches, from plaintext defaults to end-to-end encryption