Search results
Jump to navigation
Jump to search
- * Textsecure is mobile shared key encryption. Validated through phone numbers. Currently Android only, soon will run on478 bytes (69 words) - 23:37, 4 May 2015
- Encryption ** Encryption2 KB (251 words) - 21:30, 20 May 2015
- Encryption Software: 5th amendment claim to not turn over pass phrase, no precedent of Pgpdesktop – mac encryption2 KB (300 words) - 18:48, 5 May 2015
- * TruCrypt -- full disk encryption * How PGP Works: public / private key encryption a la SSL4 KB (748 words) - 17:21, 5 May 2015
- * increased use of encryption hurts law enforcement * Encryption is too hard to use5 KB (823 words) - 21:52, 19 November 2015
- * Encryption is over. * Encryption is too hard for the average user5 KB (735 words) - 16:42, 5 May 2015
- ...e – who need encryption to stay safe. In an act of solidarity – by using encryption we can raise the bar. Start a community against surveillance. ...om a site that is using http. Traffic can be intercepted. Source forge no encryption. Easy for whoever is control of the exit node or relay and intercept traffi7 KB (1,161 words) - 21:49, 22 November 2016
- *How to get email encryption for our legal team using Windows? #Using Google Apps, but in parallel with Thunderbird, so I can have email encryption if I want, depending who I am writing with5 KB (800 words) - 22:45, 29 November 2017
- * Security challenge of encryption * Durress passwords, plausible deniability encryption3 KB (436 words) - 01:30, 23 November 2016
- .... However, here are many more layers we are ignoring. We are worried about encryption of conversation, but we don’t think of the breaches of privacy built into Encryption - how encryption works and how it doesn’t; at rest vs in transit; through the different la5 KB (776 words) - 21:37, 9 January 2019
- ...ncryption technologies can make you less secure, and alternatives to using encryption tools (+1 — how can we think about “human encryption”)?10 KB (1,602 words) - 17:40, 7 November 2019
- Open source software gets a lot of peer review for its encryption good things but they have given encryption keys to some countries.5 KB (915 words) - 17:47, 5 May 2015
- e. Encryption1 KB (213 words) - 18:07, 5 May 2015
- ==Storing data in encrypted form, encryption key stores separately, data is only un-encrypted when its going to be used5 KB (727 words) - 23:09, 28 November 2017
- ...y checks that the certificate owner also controls the domain, and that the encryption key is OK for communications with the domain. ...sing the wrong encryption key, and the certificate authority says that the encryption key is the correct key for the certificate owner.8 KB (1,293 words) - 19:21, 22 November 2016
- *encryption is no longer useful *encryption tools work to protect privacy6 KB (849 words) - 23:37, 4 May 2015
- * pgp encryption * Full disk encryption4 KB (599 words) - 20:19, 22 November 2016
- movingtoward: decentralized identifier (DID), globally resolvable public key encryption endpoint public key encryption = super password you never have to share, you can prove you hold the identi4 KB (684 words) - 19:00, 9 December 2023
- SSL does more than encryption ...lower to establish the conversation – as there is a conversation about the encryption and then serves the content4 KB (717 words) - 17:47, 5 May 2015
- Custom authorization and encryption levels Some use a little flash with its internal encryption to insulate the OAuth from most people.4 KB (708 words) - 21:30, 20 May 2015
- - focused on privacy and encryption - [https everywhere!](https://www.eff.org/https-everywhere) - oportunistic encryption add-on5 KB (813 words) - 00:44, 29 November 2017
- TLS encryption is everywhere now with LetsEncrypt.2 KB (304 words) - 19:10, 9 December 2023
- - You should be using end to end encryption, not trusting your network.2 KB (403 words) - 17:47, 5 May 2015
- * Can't have legal encryption... No readily available consumer radio with voice encryption. (Let me know if you know otherwise!) Commercial radios (e.g. motorola) can5 KB (807 words) - 22:24, 7 December 2018
- ..., e.g. some cloud data storage services let you have control over your own encryption key, so only you have access to it at any time. ** SpiderOak: "zero-knowledge encryption" for data storage7 KB (1,194 words) - 17:47, 5 May 2015
- The government tried to actively block the creation of new encryption technologies but had to back down when Gore was running, becuase Silicon Va We need to convince people that encryption is worth it and important.9 KB (1,583 words) - 17:21, 5 May 2015
- * Privacy - how are people dealing with sensitive data hosting, storage and encryption3 KB (471 words) - 23:08, 20 May 2015
- **Metaphor of the layered onion to describe layers of encryption3 KB (544 words) - 22:35, 28 November 2017
- - encryption4 KB (622 words) - 16:37, 17 November 2017
- * Mandate encryption backdoors3 KB (452 words) - 20:02, 22 November 2016
- .... BUT iCloud is vulnerable to subpoena bc the data on iCloud Apple has the encryption keys.4 KB (643 words) - 19:26, 22 November 2016
- Laptops when crossing borders: Are you required to hand over your encryption key? There isn't a clear precedence. EFF is looking for a case to litigat4 KB (664 words) - 18:48, 5 May 2015
- * Writing encryption software as a sort of protest and direct opposition to the surveillance sta4 KB (511 words) - 18:56, 22 November 2016
- *HTTPS Everywhere is a browser plugin for Chrome and Firefox that forces encryption where available (i.e. entering http://myface.com redirects to https://myfac4 KB (703 words) - 23:37, 4 May 2015
- *Advanced encryption is not affordable. More secure smartphones (iPhone) are the most expensive5 KB (774 words) - 00:27, 22 November 2017
- ...ional) can be useful to explain security. It helps understand, maybe not "encryption" but, "why information (and its privacy) is important to you". It's the fir5 KB (743 words) - 23:37, 4 May 2015
- etc). 10 million sync users. client side encryption.5 KB (799 words) - 18:25, 5 May 2015
- * Encryption just means you are protected, for awhile6 KB (855 words) - 18:28, 5 May 2015
- * Explanation of PGP encryption (note taker explained and therefore didn't take notes, check out Chap 12 (o ...ign; their free software does a political thing that is backed up by math (encryption); no amount of violence or power can violate that. This can be applied to a13 KB (2,128 words) - 18:07, 5 May 2015
- ...ionals ethical duties to their clients. Ethical duties are a way to spread encryption. (e.g. bar associations, lawyers, medical professionals). Lots of examples of training on encryption. On full16 KB (2,897 words) - 23:20, 30 November 2016
- ...em that the hosting provider won’t just hand over the data, has disc level encryption, crucially important for the folks they work with7 KB (1,270 words) - 17:47, 5 May 2015
- ...no support for tags or javascript. That has a lot of solutions of web (SSL encryption & security), can use same dev tools as web sites, but very limited.7 KB (1,257 words) - 18:48, 5 May 2015
- ...'re using Tor when they visit that site, and they get some extra layers of encryption. For the extra-ambitious: setting up a Tor hidden service. Facebook even ha8 KB (1,447 words) - 21:48, 22 November 2016
- ...ut more secure. Zoom is also relatively accessible/ubiquitous and supports encryption, but it can be difficult to request everyone install Zoom as a first step b8 KB (1,292 words) - 19:09, 30 November 2021
- Can use GPG encryption on email, but it's challenging to get people to use and many find it very c7 KB (1,191 words) - 23:04, 17 November 2022
- * [[Circumvention and Encryption - What EFF is Up To]] - Facilitator: Corynne, Note taker: Sarah ...o in software embedded in hardware. Also surviellance work, and protecting encryption. If you're not a member, become one!19 KB (2,922 words) - 20:11, 1 April 2016
- ...he term "Feudalism" to describe what we are seeing lately. VPNs, wireless encryption. Standardization work is frustrating. OAUTH was well-intentioned but was11 KB (1,719 words) - 17:21, 5 May 2015
- | Practical plans for email encryption implementation for small organizations17 KB (2,437 words) - 16:42, 5 May 2015
- * [[The revolution will not be optimized]] - Scott (Note Taker - Jay) - Encryption tools usable by everyone.22 KB (3,595 words) - 00:51, 14 November 2017