How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Posts Tagged ‘pgp’
Most Recent
Read More
December 13, 2014

Making Encrypted Email Usable

When Edward Snowden reached out to Glenn Greenwald and Laura Poitras he insisted they use specific encryption methods. The two journalists required quite a bit of assistance from Micah Lee in order to communicate safely using Pretty Good Privacy, an email encryption standard which has been around twenty years.

The dance required is simply too complex for the average user, who doesn’t want cryptography; they just want to communicate safely. @SwiftOnSecurity, Twitter’s self appointed Information Security Thought Princess, recently summed up the issues in a single tweet.

But I’m Using SSL to Read my Encrypted Email

@SwiftOnSecurity [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University