INTRO This article follows the one presenting the SGX technology. We will see the technical application of SGX for a proof of concept (POC) realized on the Parsec application. PARSEC IN AES Parsec uses the PyNacl library (a python module based on Libsodium written...
What is the difference between public cloud, private cloud and hybrid cloud?
In computing, the cloud represents an online storage system consisting of several remote servers on which your computer data (files, images, photos, videos, etc.) is stored. Data can only be accessed via the Internet. The use...
Technical feedback on the porting of PARSEC to MacOS
Parsec available on MacOs
NAOS Gold: 2020 Open Source Innovation Award
We are very happy to have won once again a prize for the disruptive innovation that is our solution Parsec.thank you to Région Nouvelle-Aquitaine, NAOS Nouvelle-Aquitaine Open Source and to the members of the jury for this recognition.
PARSEC, currently undergoing CSPN certification
The protection of sensitive data is nowadays a key issue for the sovereignty of companies. In a context where companies are increasingly subject to cyberattacks on their data, the guarantee of the use of approved solutions for the protection of sensitive data is essential...
5 new paradigms of data security in an ultra-connected world
In 2020, the global cost of the cyber threat is estimated at 4 billion dollars with an annual growth of 50%. As the cyber threat becomes both endogenous and exogenous to the perimeter intranet network, perimeter protection of the "Maginot line" or "...
Intel Software Guard Extensions
INTRO In a context of health crisis, companies are increasingly required to work with remote employees. In order to protect themselves from cyber attacks and to protect their critical data, various solutions are possible. At Parsec, we...
Our experience with Hypothesis testing (and why do we love it so much!)
Intro At Scille, we are developing Parsec : an open-source zero-trust file sharing software (think of it as a Dropbox with full client-side encryption). The project has been in development for 4 years (5k commits on master, 12 contributors) and has been used...
European digital sovereignty, a question of political will (2)
Part 2 Benchmarks Destabilization of democracies, cyber-attacks on our societies, exploitation of sensitive personal data and, at the extreme end of the spectrum, war in cyberspace; the digital environment is in the midst of a revolution....