The breakthrough was enormous, says the former official, and soon afterward the agency pulled the shade down tight on the project, even within the intelligence community and Congress. “Only the chairman and vice chairman and the two staff directors of each intelligence committee were told about it,” he says. The reason? “They were thinking that this computing breakthrough was going to give them the ability to crack current public encryption.”Read more »
A new technology that allows users to send and receive highly encrypted photos, voice recordings, videos, and PDFs securely.
photos, voice recordings, videos, and PDFs securelyRead more »
PGP Founder's new startup, from http://www.buzzfeed.com/tommywilhelm/why-is-the-government-afraid-of-thi...Read more »
"Two Navy SEALs are bringing world-class encryption to the iPhone, for everything from state secrets to celebrity selfies. But that means it can be used by criminals as well."Read more »
...In 1785, a resolution authorized the secretary of the Department of Foreign Affairs to open and inspect any mail that related to the safety and interests of the United States. The ensuing inspections caused prominent men, like George Washington, to complain of mail tampering. According to various historians, it also led James Madison, Thomas Jefferson and James Monroe to correspond in code. That is, they encrypted their letters to preserve the privacy of their political discussions.Read more »
Because computers are incapable of being truly random, any encryption system that relies on random numbers to generate keys (like RSA and SSL)become vulnerable to an attacker being able to duplicate the public and private key pair and compromise your security.Read more »
In a case going back to 2010, a Colorado judge has ruled that a woman named as a defendant in a criminal case can be forced to decrypt the contents of her laptop and files. Answering the question of 'what about her fifth amendment right to non-self-incrimination, the judge ruled the fifth amendment does not apply in this case, even though the contents of the protected files could be used to prosecute and convict her.Read more »
LIVE 7 Days a Week!
Mon-Sun: 7pm-10pm Eastern