Tags
Author: tarekma7 - Replies: 0 - Views: 1615
Shamed Amazon Decides to Restore Full-Disk Encryption to Its Fire OS Devices
Amazon caves in to all the user and media pressure

Amazon has announced it will be restoring support for full-disk encryption to its mobile devices running Fire OS after the company was criticized from all sides this past weekend.

The entire scandal started after a user received a delayed update to Fire OS 5 for his Amazon device. The user read the changelog and discovered that the new Fire OS 5 version had removed support for ful
Author: baziroll - Replies: 0 - Views: 1589
Full end-to-end encryption shows WhatsApp is serious about privacy
[Image: http://betanews.com/wp-content/uploads/2...099563.jpg]
Encryption has been a hot topic for some time, but the battle between Apple and the FBI really brought it to the fore in recent weeks. In response to the FBI trying -- [url=http://betanews.com/2016/03/28/fbi-cracks-iphone/]ultimately s
Author: baziroll - Replies: 0 - Views: 1167
Viber introduces end to end encryption
[Image: http://betanews.com/wp-content/uploads/2...yption.jpg]
The major messaging services are now placing a greater emphasis on their users' privacy and security, following the heated encryption debate started by Apple and the FBI. Viber has just announced end-to-end encryption support, making it the second leading player this month to introduce this feature after WhatsApp.
Viber has over 700 million us
Author: tarekma7 - Replies: 0 - Views: 1027
Fort Encryption Review
Author: tarekma7 - Replies: 0 - Views: 1162
PowerCryptor Encryption Suite (11.98$)
Author: tarekma7 - Replies: 1 - Views: 2396
Use USB Encryption Tools to Password-Protect Files and Folders on the Go
One of the many security methods available for protecting sensitive files and folders is through USB drive encryption. This way, you can take the secure devices with you and access the secret contents on any computer, as long as you remember the password.

In the following guide, we're looking into three Windows applications dedicated to this task to show you how they work: BitLocker, USB Safeguard and Kaka USB Security. BitLocker is free, mad
Author: baziroll - Replies: 0 - Views: 1006
BestCrypt Container Encryption v.9.02.11.1
BestCrypt Container Encryption provides painless encryption to store any selected files or folders on:
  • Active computers.
  • Shared workstations.
  • Removable storage.
  • Network storage.
 
Encrypted containers work like virtual drives – intuitively easy with transparent use and access to files. File encryption by Jetico delivers cross-platform compatibility: BestCrypt container files may be moved to any computer or storage media, working seamlessly between Windows, Mac OS
Author: baziroll - Replies: 0 - Views: 922
Fort - File encryption 3.1
[Image: http://www.cryptoextension.eu/screen2.png]

Cryptography and data encryption is important. In todays world we are connected all the time. We put our files on different cloud services where they are basically available for the companies running those services and for criminals who might be able to gain access those services. There are many "free" services in which the only way to pay is with your privacy. One might think that "I have nothing to hide". That's not the point. The point i
Author: mrtrout - Replies: 0 - Views: 1104
WWW inventor Tim Berners-Lee opposes encryption backdoors
https://www.helpnetsecurity.com/2017/04/...backdoors/    
 Zeljka Zorz - Managing Editor
April 5, 2017
WWW inventor Tim Berners-Lee opposes encryption backdoors

Read the latest issue of the (IN)SECURE Magazine
As the de-facto inventor of the world wide web, Sir Tim Berners-Lee’s opinions on things like online privacy and encryption backdoors should carry a lot more weight than those of most people.

encryption backdoors

Why encryption backdoors are a no
Author: baziroll - Replies: 0 - Views: 1054
Public Key Encryption: Elliptic Curve Ciphers
[Video: https://www.youtube.com/watch?v=_CwIWk6X...freload=10]
Published on Jun 12, 2017
I made a mistake ... the equation is y^2 = x^3 - 3x + 5 ... I should have said "="

Details:

http://asecuritysite.com/encryption/ecc
http://asecuritysite.com/comms/plot05