Home encrypted
 

Keywords :   


Tag: encrypted

We Asked Experts What Would Happen If Everything Was Encrypted

2016-02-17 22:04:41| PC Magazine Software Product Guide

Would it even be possible? Security experts from Access Now and the Electronic Frontier Foundation weigh in.

Tags: was asked experts happen

 

We Asked Experts What Would Happen If Everything Was Encrypted

2016-02-17 20:04:10| PC Magazine Security Product Guide

Would it even be possible? Security experts from Access Now and the Electronic Frontier Foundation weigh in.

Tags: was asked experts happen

 
 

Keybase Releases Encrypted File-Sharing iPhone App

2016-02-08 19:43:38| TechNewsWorld

Keybase last week announced the alpha release of the Keybase app for the iPhone with a cryptographically secure file mount. Users can write data in an automatically created folder in this format: /keybase/public/username. Files written in the folder are signed automatically and appear as plain text files. The folder prevents server-side and man-in-the-middle attacks, Keybase said.

Tags: releases app iphone encrypted

 

Western Digital to buy SanDisk, experts eviscerate WDs encrypted hard drives

2015-10-21 20:09:26| Extremetech

Western Digital announced it intended to buy SanDisk for some $19 billion, but the news is overshadowed by massive problems with its encrypted hard drives.

Tags: buy hard digital western

 

US govt will not seek access to encrypted user data

2015-10-12 10:08:00| Telecompaper Headlines

(Telecompaper) The Obama administration has backed down in its dispute with Silicon Valley over the encryption of data on iPhones and other digital devices, concluding that it is not possible to give US law enforcement and intelligence agencies access to that information without also creating an opening that cybercriminals and terrorists could exploit, the New York Times reported. With its decision, which angered the FBI and other law enforcement agencies, the administration essentially agreed with Apple, Google, Microsoft and a group of the nation's top cryptographers and computer scientists that US inhabitants would be vulnerable to hacking if technology firms and smartphone manufacturers were required to provide the government with "back doors," or access to their source code and encryption keys. This would enable the government to see messages, photographs and other data now routinely encrypted on smartphones. Current technology puts the keys for access to the information in the hands of the individual user, not the companies.

Tags: user data access seek

 

Sites : [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] next »