高华气象

CEO Blog

A virtual club to communicate with peers and users in the cryptographic industry
Meet friends on blog, it is my mission to popularize cryptographic knowledge, cryptographic application and zero trust ideas.

  • Recommended
  • SM2 ECO
  • Website Security
  • Email Security
  • Document Security
  • ZT Browser
  • Digital Certificate
  • Identity Trusted
  • Zero Trust
  • Other Topics
  • E-contract and E-mail, Two in One

    E-contract and E-mail, Two in One

    This article discusses how electronic contracts and emails can be combined into one. Users can use ZT Browser to complete the digital signing of electronic contracts with one click when sending emails. This is simpler than signing contracts on traditional e-contract signing platforms that no need to upload the original contract document, and it can better protect the security of users' contract confidential information. It is also completely free.

    November 25, 2024Read more
    The day email encryption becomes commonplace is the day fraud emails die

    The day email encryption becomes commonplace is the day fraud emails die

    Fraud emails have caused a global loss of $55.5 billion over the past decade. This article proposes a complete solution to eradicate email fraud - popularizing email encryption application. This article also shows how ZT Browser UI specifically displays email identity information, which effectively prevents email fraud.

    November 14, 2024Read more
    How does ZT Browser automate the implementation of trusted email timestamping service?

    How does ZT Browser automate the implementation of trusted email timestamping service?

    This article discloses in advance the email timestamping service provided by ZT Browser innovation in the world, so that every email sent by ZT Browser can automatically realize the trusted proof of email sending time like regular mail has a postmark proof.

    November 11, 2024Read more
    How does ZT Browser automate key management?

    How does ZT Browser automate key management?

    The third challenge of S/MIME email encryption is key management, this article discloses how ZT Browser automates key management, and only by automatically managing keys can email encryption be truly automated.

    November 07, 2024Read more
    How does ZT Browser automate public key exchange?

    How does ZT Browser automate public key exchange?

    The second difficulty of S/MIME email encryption is public key exchange. This article discloses how ZT Browser realizes the automation of public key exchange. Only by realizing automatic exchange of public keys can email encryption automation be truly realized.

    November 04, 2024Read more
    How does ZT Browser realize the automatic email certificate management?

    How does ZT Browser realize the automatic email certificate management?

    This article explains how ZoTrus Technology realizes automatic email certificate management, only by automatically configuring email certificates can automatic-email-encryption be realized, and only by popularizing email encryption can we ensure the security of email content in transit and in the cloud.

    October 30, 2024Read more
    Cloud and Privacy Can Be Both

    Cloud and Privacy Can Be Both

    This article reveals in advance how the ZT Browser Email Encryption Service uses email encryption technology to protect the confidential information of users' address books, cleverly solving the contradiction between cloud services and privacy protection, allowing both to be achieved.

    October 28, 2024Read more
    Email encryption still has a long way to go with a heavy load

    Email encryption still has a long way to go with a heavy load

    This article summarizes the advantages and disadvantages of various email encryption solutions and reviews the author's 20 years of email encryption research. The author hope that readers will have a clear understanding of email encryption technology and choose the right email encryption solution.

    October 22, 2024Read more
    Email is bound to become a core application of Web 3.0

    Email is bound to become a core application of Web 3.0

    This article summarizes the development history of the Web and draws an important conclusion: Email will become a core application of Web 3.0, and to achieve this goal, email encryption automation is the key.

    October 16, 2024Read more
    Interpretation of the U.S. Federal Zero Trust Strategy (Part 3): Email Security

    Interpretation of the U.S. Federal Zero Trust Strategy (Part 3): Email Security

    The U.S. Federal Zero Trust Strategy does not provide a specific solution for encrypting email traffic, because the industry does not have a good solution yet. It only proposes that the email encryption solution must be based on open standards, it is invisible to end users. Currently, only ZoTrus Technology in the world has done it.

    October 14, 2024Read more
    Only by Automating End-to-End Encryption Can Truly ensure Email Security

    Only by Automating End-to-End Encryption Can Truly ensure Email Security

    This article explains what true end-to-end encryption is and what kind of end-to-end encryption users should choose to truly protect the security of their email confidential information. This article also briefly introduces the upcoming ZoTrus email encryption automation solution.

    October 11, 2024Read more
    Email Needs Zero Trust

    Email Needs Zero Trust

    4 billion emails are sent worldwide every month, 90% of cyberattacks start with phishing emails, 97% of people cannot accurately identify phishing email scams, and Gmail blocks more than 100 million phishing emails every day. What do these data means?

    October 09, 2024Read more
    HTTPS encryption automation and email encryption automation

    HTTPS encryption automation and email encryption automation

    This article summarizes the work done by ZoTrus Technology in HTTPS encryption automation. The next hot spot for cryptographic applications will be email encryption automation. This article also clarifies the relationship between HTTPS encryption automation and email encryption automation and the different missions they accomplish.

    September 29, 2024Read more
    One Article Clarifies Four Very Brain-Burning WAF Terms

    One Article Clarifies Four Very Brain-Burning WAF Terms

    This article explains four brain-burning WAF terms in an easy-to-understand manner, and only by understanding these terms can you correctly judge the protection performance of WAF and correctly select WAF devices and cloud WAF services. This article further explains why WAF needs to automate SSL certificate management.

    May 29, 2024Read more
    ZT Browser Patches the SM2 Algorithm for Windows

    ZT Browser Patches the SM2 Algorithm for Windows

    ZT Browser has done another big thing - patching Windows to make Windows perfectly support the SM2 algorithm, so that Windows users around the world can verify and view the SM2 SSL certificate normally and choose the SM2 algorithm for global users to ensure global Internet security.

    May 16, 2024Read more
    Fake Websites are Rampant, What must Browsers Do?

    Fake Websites are Rampant, What must Browsers Do?

    Fake and fraudulent websites are rampant, and browsers must do something to prevent users from falling for them. ZT Browser's green address bar displays the trusted identity of the website, which helps users identify fake websites efficiently and simply, and can effectively prevent being deceived on fake websites. Use ZT Browser to surf the Internet now.

    May 13, 2024Read more
    Why ZT Browser Launch Trusted Root Program for Intranet SSL Certificate?

    Why ZT Browser Launch Trusted Root Program for Intranet SSL Certificate?

    The security of intranet traffic requires the intranet SSL certificate. It also requires a browser to trust the intranet SSL certificate issued by the CA. And it requires a browser to take the lead in formulating the baseline requirements for intranet SSL certificates. ZT Browser is the first in the world to support intranet SSL certificates to ensure the security of intranet Web traffic.

    April 24, 2024Read more
    Create an Intranet SSL Certificate Application Ecosystem

    Create an Intranet SSL Certificate Application Ecosystem

    Deploying an intranet SSL certificate is the only reliable solution to ensure the security of intranet web traffic, but the application of intranet SSL certificate is an ecosystem problem, and there must be corresponding ecosystem products to truly realize the popularization and application of intranet SSL certificates.

    April 22, 2024Read more
    Intranet SSL certificates must also support certificate transparency

    Intranet SSL certificates must also support certificate transparency

    ZoTrus SM2 Certificate Transparency system supports SM2/RSA/ECC algorithm SSL certificates, which is the first in the world, providing technical exploration, operation and maintenance practices for the unified transparency management of RSA/ECC SSL certificates and SM2 SSL certificates.

    April 22, 2024Read more
    Richard_wang

    Dear Readers,

    Since the subtitle of the CEO blog is “Meet friends on blog”, as a scientific and technological worker rather than a literato, please do not care whether the grammar of the blog post is correct, but whether the article can help you understand PKI technology, cryptographic and zero trust. I have 30 years of experience in the IT industry, including CA, cryptography, software development, Internet, Internet security etc. Over the years, I have participated in many important domestic and international academic conferences, to understand the differences between Chinese and Western cultures and the latest technological frontiers. And has published many academic articles in newspapers and periodicals. In company operation, the two companies I founded have been acquired by a public listed Internet security company, and one of them is a CA that had won the sixth place in the world in the SSL certificate market and the first in the Chinese market.

    I firmly believe that my article will bring value to readers both academically and company operation. thanks.

    Welcome to follow the official WeChat of ZoTrus: zotrus, which will push each new blog in real time, so that you will not miss every wonderful blog post.

    Richard wang
    Dec. 9, 2021, in Shenzhen, China