Search results

Jump to navigation Jump to search
  • * Textsecure is mobile shared key encryption. Validated through phone numbers. Currently Android only, soon will run on
    478 bytes (69 words) - 23:37, 4 May 2015
  • Encryption ** Encryption
    2 KB (251 words) - 21:30, 20 May 2015
  • Encryption Software: 5th amendment claim to not turn over pass phrase, no precedent of Pgpdesktop – mac encryption
    2 KB (300 words) - 18:48, 5 May 2015
  • * TruCrypt -- full disk encryption * How PGP Works: public / private key encryption a la SSL
    4 KB (748 words) - 17:21, 5 May 2015
  • * increased use of encryption hurts law enforcement * Encryption is too hard to use
    5 KB (823 words) - 21:52, 19 November 2015
  • * Encryption is over. * Encryption is too hard for the average user
    5 KB (735 words) - 16:42, 5 May 2015
  • ...e – who need encryption to stay safe. In an act of solidarity – by using encryption we can raise the bar. Start a community against surveillance. ...om a site that is using http. Traffic can be intercepted. Source forge no encryption. Easy for whoever is control of the exit node or relay and intercept traffi
    7 KB (1,161 words) - 21:49, 22 November 2016
  • *How to get email encryption for our legal team using Windows? #Using Google Apps, but in parallel with Thunderbird, so I can have email encryption if I want, depending who I am writing with
    5 KB (800 words) - 22:45, 29 November 2017
  • * Security challenge of encryption * Durress passwords, plausible deniability encryption
    3 KB (436 words) - 01:30, 23 November 2016
  • .... However, here are many more layers we are ignoring. We are worried about encryption of conversation, but we don’t think of the breaches of privacy built into Encryption - how encryption works and how it doesn’t; at rest vs in transit; through the different la
    5 KB (776 words) - 21:37, 9 January 2019
  • ...ncryption technologies can make you less secure, and alternatives to using encryption tools (+1 — how can we think about “human encryption”)?
    10 KB (1,602 words) - 17:40, 7 November 2019
  • Open source software gets a lot of peer review for its encryption good things but they have given encryption keys to some countries.
    5 KB (915 words) - 17:47, 5 May 2015
  • e. Encryption
    1 KB (213 words) - 18:07, 5 May 2015
  • ==Storing data in encrypted form, encryption key stores separately, data is only un-encrypted when its going to be used
    5 KB (727 words) - 23:09, 28 November 2017
  • ...y checks that the certificate owner also controls the domain, and that the encryption key is OK for communications with the domain. ...sing the wrong encryption key, and the certificate authority says that the encryption key is the correct key for the certificate owner.
    8 KB (1,293 words) - 19:21, 22 November 2016
  • *encryption is no longer useful *encryption tools work to protect privacy
    6 KB (849 words) - 23:37, 4 May 2015
  • * pgp encryption * Full disk encryption
    4 KB (599 words) - 20:19, 22 November 2016
  • movingtoward: decentralized identifier (DID), globally resolvable public key encryption endpoint public key encryption = super password you never have to share, you can prove you hold the identi
    4 KB (684 words) - 19:00, 9 December 2023
  • SSL does more than encryption ...lower to establish the conversation – as there is a conversation about the encryption and then serves the content
    4 KB (717 words) - 17:47, 5 May 2015
  • Custom authorization and encryption levels Some use a little flash with its internal encryption to insulate the OAuth from most people.
    4 KB (708 words) - 21:30, 20 May 2015
  • - focused on privacy and encryption - [https everywhere!](https://www.eff.org/https-everywhere) - oportunistic encryption add-on
    5 KB (813 words) - 00:44, 29 November 2017
  • TLS encryption is everywhere now with LetsEncrypt.
    2 KB (304 words) - 19:10, 9 December 2023
  • - You should be using end to end encryption, not trusting your network.
    2 KB (403 words) - 17:47, 5 May 2015
  • * Can't have legal encryption... No readily available consumer radio with voice encryption. (Let me know if you know otherwise!) Commercial radios (e.g. motorola) can
    5 KB (807 words) - 22:24, 7 December 2018
  • ..., e.g. some cloud data storage services let you have control over your own encryption key, so only you have access to it at any time. ** SpiderOak: "zero-knowledge encryption" for data storage
    7 KB (1,194 words) - 17:47, 5 May 2015
  • The government tried to actively block the creation of new encryption technologies but had to back down when Gore was running, becuase Silicon Va We need to convince people that encryption is worth it and important.
    9 KB (1,583 words) - 17:21, 5 May 2015
  • * Privacy - how are people dealing with sensitive data hosting, storage and encryption
    3 KB (471 words) - 23:08, 20 May 2015
  • **Metaphor of the layered onion to describe layers of encryption
    3 KB (544 words) - 22:35, 28 November 2017
  • - encryption
    4 KB (622 words) - 16:37, 17 November 2017
  • * Mandate encryption backdoors
    3 KB (452 words) - 20:02, 22 November 2016
  • .... BUT iCloud is vulnerable to subpoena bc the data on iCloud Apple has the encryption keys.
    4 KB (643 words) - 19:26, 22 November 2016
  • Laptops when crossing borders: Are you required to hand over your encryption key? There isn't a clear precedence. EFF is looking for a case to litigat
    4 KB (664 words) - 18:48, 5 May 2015
  • * Writing encryption software as a sort of protest and direct opposition to the surveillance sta
    4 KB (511 words) - 18:56, 22 November 2016
  • *HTTPS Everywhere is a browser plugin for Chrome and Firefox that forces encryption where available (i.e. entering http://myface.com redirects to https://myfac
    4 KB (703 words) - 23:37, 4 May 2015
  • *Advanced encryption is not affordable. More secure smartphones (iPhone) are the most expensive
    5 KB (774 words) - 00:27, 22 November 2017
  • ...ional) can be useful to explain security. It helps understand, maybe not "encryption" but, "why information (and its privacy) is important to you". It's the fir
    5 KB (743 words) - 23:37, 4 May 2015
  • etc). 10 million sync users. client side encryption.
    5 KB (799 words) - 18:25, 5 May 2015
  • * Encryption just means you are protected, for awhile
    6 KB (855 words) - 18:28, 5 May 2015
  • * Explanation of PGP encryption (note taker explained and therefore didn't take notes, check out Chap 12 (o ...ign; their free software does a political thing that is backed up by math (encryption); no amount of violence or power can violate that. This can be applied to a
    13 KB (2,128 words) - 18:07, 5 May 2015
  • ...ionals ethical duties to their clients. Ethical duties are a way to spread encryption. (e.g. bar associations, lawyers, medical professionals). Lots of examples of training on encryption. On full
    16 KB (2,897 words) - 23:20, 30 November 2016
  • ...em that the hosting provider won’t just hand over the data, has disc level encryption, crucially important for the folks they work with
    7 KB (1,270 words) - 17:47, 5 May 2015
  • ...no support for tags or javascript. That has a lot of solutions of web (SSL encryption & security), can use same dev tools as web sites, but very limited.
    7 KB (1,257 words) - 18:48, 5 May 2015
  • ...'re using Tor when they visit that site, and they get some extra layers of encryption. For the extra-ambitious: setting up a Tor hidden service. Facebook even ha
    8 KB (1,447 words) - 21:48, 22 November 2016
  • ...ut more secure. Zoom is also relatively accessible/ubiquitous and supports encryption, but it can be difficult to request everyone install Zoom as a first step b
    8 KB (1,292 words) - 19:09, 30 November 2021
  • Can use GPG encryption on email, but it's challenging to get people to use and many find it very c
    7 KB (1,191 words) - 23:04, 17 November 2022
  • * [[Circumvention and Encryption - What EFF is Up To]] - Facilitator: Corynne, Note taker: Sarah ...o in software embedded in hardware. Also surviellance work, and protecting encryption. If you're not a member, become one!
    19 KB (2,922 words) - 20:11, 1 April 2016
  • ...he term "Feudalism" to describe what we are seeing lately. VPNs, wireless encryption. Standardization work is frustrating. OAUTH was well-intentioned but was
    11 KB (1,719 words) - 17:21, 5 May 2015
  • | Practical plans for email encryption implementation for small organizations
    17 KB (2,437 words) - 16:42, 5 May 2015
  • * [[The revolution will not be optimized]] - Scott (Note Taker - Jay) - Encryption tools usable by everyone.
    22 KB (3,595 words) - 00:51, 14 November 2017