Search results

Jump to navigation Jump to search
  • ...em that the hosting provider won’t just hand over the data, has disc level encryption, crucially important for the folks they work with
    7 KB (1,270 words) - 17:47, 5 May 2015
  • ...no support for tags or javascript. That has a lot of solutions of web (SSL encryption & security), can use same dev tools as web sites, but very limited.
    7 KB (1,257 words) - 18:48, 5 May 2015
  • ...'re using Tor when they visit that site, and they get some extra layers of encryption. For the extra-ambitious: setting up a Tor hidden service. Facebook even ha
    8 KB (1,447 words) - 21:48, 22 November 2016
  • ...ut more secure. Zoom is also relatively accessible/ubiquitous and supports encryption, but it can be difficult to request everyone install Zoom as a first step b
    8 KB (1,292 words) - 19:09, 30 November 2021
  • Can use GPG encryption on email, but it's challenging to get people to use and many find it very c
    7 KB (1,191 words) - 23:04, 17 November 2022
  • * [[Circumvention and Encryption - What EFF is Up To]] - Facilitator: Corynne, Note taker: Sarah ...o in software embedded in hardware. Also surviellance work, and protecting encryption. If you're not a member, become one!
    19 KB (2,922 words) - 20:11, 1 April 2016
  • ...he term "Feudalism" to describe what we are seeing lately. VPNs, wireless encryption. Standardization work is frustrating. OAUTH was well-intentioned but was
    11 KB (1,719 words) - 17:21, 5 May 2015
  • | Practical plans for email encryption implementation for small organizations
    17 KB (2,437 words) - 16:42, 5 May 2015
  • * [[The revolution will not be optimized]] - Scott (Note Taker - Jay) - Encryption tools usable by everyone.
    22 KB (3,595 words) - 00:51, 14 November 2017

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)