All ArticlesStatementsOp-Eds from JOSA's CommunityCommunity Bulletins
Article placeholder image

How Encrypted Messaging Apps Work: Matrix, Signal, and WhatsApp Compared

Information Security Engineer, Ahmad Obeidat, talks about how encryption protocols work, how different IM apps handle their security and metadata, and why their trust models differ, helping readers choose the right app for their privacy needs.

December 7, 2025

Author Image

Ahmad Obeidat

Article placeholder image

Compilers: The Heroes behind the Scenes

The importance of compilers could not be understated, they are the bond between software and hardware , and yet most programmers don't even consider becoming compiler engineers. Omar Al-Azizi is an exception, and in this article he explains why

August 19, 2025

Author Image

Omar Al-Azizi

image

Digital Safety

What Makes a Good Cryptographic Random Number Generator?

Unpredictability isn't something we look forward to, except when it comes to Cryptographic Random Number Generators (CRNG), where it is sought for in all forms, alongside statistical randomness and resistance to cryptanalytic attacks. This article explains the differences between generators and what makes for a solid one.

July 15, 2025

Author Image

Yazeed Allabadi

image

Digital Safety

QR Codes: Think before you Scan

QR codes are everywhere, from menus to tickets, but they’re not always safe. A new scam called quishing hides malicious links in innocent-looking QR codes, putting your data at risk the moment you scan. Here’s how to spot fake QR codes and protect your phone, wallet, and identity.

January 14, 2025

Author Image

Mahabba Akeel