While it's unknown how long CPUs without AES support will be around, there will likely always be a "low end". it's immensely valuable to provide a software-optimized cipher that doesn't depend on hardware support. Lack of hardware support should not be an excuse for no encryption.
There is confidential information across most industries that if exposed can result in severe brand reputation damage, lost revenue, legal fees, reparation and punitive damage costs and non-compliance fines.
With pass, each password lives inside of a gpg encrypted file whose filename is the title of the website or resource that requires the password. These encrypted files may be organized into meaningful folder hierarchies, copied from computer to computer, and, in general, manipulated using standard command line file management utilities.
The UK government has secretly drawn up more details of its new bulk surveillance powers – awarding itself the ability to monitor Brits' live communications, and insert encryption backdoors by the backdoor.
We’re living in a time period where the new incumbents like Amazon, Google, and Facebook have firmly established themselves, and are near monopolists in their markets. If we want a long-term, open playing field for innovation, we’re going to need new, decentralized infrastructure. Blockstack’s vision is made possible by an identity system built to be independent of any one company, including the startup itself. It uses the digital ledger, or blockchain, underpinning the digital currency Bitcoin to track usernames and associated encryption keys that allow a person to control his or her data and identity. A collective of thousands of computers around the globe maintains the blockchain, and no one entity controls it.
The tech industry has hit back at France and Germany's demands for EU laws requiring secret backdoors in file and communications encryption.
Tox is free and open source, encrypts messages, uses a P2P network to relay messages, and has clients for a wide range of platforms, including mobile devices.
Over the past several years, Marlinspike has quietly positioned himself at the front lines of a quarter-century-long war between advocates of encryption and law enforcement.
Linux tools that allow you to encrypt your flash drives with ease.
A custom Android phone is being pitched to security and privacy pundits promising to deliver by goring Google services, preventing app installation, and deploying end-to-end encryption.
Enterprises are routinely storing corporate password files in the cloud through Microsoft’s OneDrive backup technology. OneDrive is the most common Office 365 application, with 79.1 per cent of organisations using it. The average corporate OneDrive service contains 204 unencrypted files labelled “passwords”.
Computer scientists have developed a new method for producing truly random numbers, a breakthrough that could be used to encrypt data, make electronic voting more secure, conduct statistically significant polls and more accurately simulate complex systems such as Earth's climate. The new method creates truly random numbers with less computational effort than other methods, which could facilitate significantly higher levels of security.
Cryptomator is advertised as being especially developed to encrypt your cloud files from services such as Dropbox, Google Drive, Mega and other cloud storage services that synchronize with a local directory. Since the encryption is done on the client side, it means that no unencrypted data is shared with any online service.
The most powerful institution that humanity has ever witnessed has also become the least restrained.
To treat government access to private communications as an entitlement would be a great mistake. It’s like saying that no private home may have thick steel doors because some day the police might want to kick the door in as part of a lawful criminal investigation.
The French parliament has voted in favor of punishing companies that refuse to decrypt data for government investigators – by threatening businesses with big fines and possible jail terms for staff.
Though quantum computers don't exist yet, they could be used to retroactively decrypt past transmissions. A team of cryptographers is already working at future-proofing the privacy of today's Internet communications from tomorrow's powerful computers.
privacytools.io provides knowledge and tools to protect your privacy.
Tox is a free and open-source, peer-to-peer, encrypted instant messaging and video calling software.
Storing SSH encryption keys and memorizing passwords can be a headache. But unfortunately in today's world of malicious hackers and exploits, basic security precautions are an essential practice.