Since 1999

Encryption Category

05/03/2017

Americans' Access to Strong Encryption is at Risk, an Open Letter to Congress

The track record of data breaches demonstrates an uncomfortable truth: when sophisticated adversaries want to hack a network, they will ultimately win. With a government mandated encryption backdoor, hackers will make Americans less safe both at home and abroad.

Read More »

04/22/2016

Calls to Ban Effective Encryption Continue Despite Data Breach Crisis

Calls for the U.S. Congress to ban effective encryption are repeated despite the current information security crisis in which data breaches are regular news.

Read More »

04/08/2016

U.S. Senate Bill Seeks to Ban Effective Encryption, Making Security Illegal

Senators Feinstein, Burr published a bill in the United States Senate that would effectively ban effective encryption. This bill essentially says you can not have any conversation or data exchange that the government can not access if it wants to.

Read More »

03/16/2016

It is not just one iPhone, the FBI wants a future where it is impractical to deploy strong encryption without key escrow

The FBI wants a future where it is illegal or impractical to deploy strong encryption without key escrow, which is a key backup system that is insecure at scale. Data breach risks will increase as our devices become less secure.

Read More »

10/16/2014

How To Protect Against the POODLE SSLv3 Vulnerability

Read More »

10/02/2014

Raspberry Pi crypto key management project!

A dedicated offline crypto key management system OpenPGP and an SSL Certificate Authority set up for air-gapped operations using a Raspberry Pi B.

Read More »

07/07/2014

Introduction to OpenPGP: Decrypt this Message

In this first part of Introduction to OpenPGP, learn to password protect a file using GnuPG, which supports symmetric encryption in addition to its more powerful asymmetric mode.

Read More »

11/25/2013

Secure Passwords & Passphrases

Read More »

06/13/2013

OpenSSL: Encrypt Data with an RSA Key with PHP

Read More »

04/05/2012

What is Protected Personally Identifiable Information? Do I really have to hash users' passwords?

Read More »