A new network has quietly been built in recent months that adds better security than even Tor. It gained some publicity this weekend when a replacement for the infamous Silk Road web site was announced. “Silk Road Reloaded” launched on Sunday, and is only accessible by downloading the special I2P software, or by configuring your computer in a certain way to connect to I2P web pages, called ‘eepsites’, and which […]
The following announcement was written by Indiana Technology and Manufacturing Companies (ITAMCO): Cupertino, California – iPhone, iPad and iPod touch users who are worried about hackers, thieves and others snooping on their private peer-to-peer conversations, can now put their worries to rest by downloading the innovative new no-cost app Crypto-Chat – which has already been described in 5-star App Store reviews as “perfect for anyone needing to hide messages from […]
Interesting article. Plenty of companies brag that their communications app is encrypted. what does that really mean and who has the key? The answers may be found at http://www.wired.com/2014/11/hacker-lexicon-end-to-end-encryption.
On Tuesday, Whatsapp announced that it’s implementing end-to-end encryption, an upgrade to its privacy protections that makes it nearly impossible for anyone to read users’ messages—even the company itself. Whatsapp will integrate the open-source software Textsecure, created by privacy-focused non-profit Open Whisper Systems, which scrambles messages with a cryptographic key that only the user can access and never leaves his or her device. The result is practically uncrackable encryption for […]
Wiper is not the only cell phone app that sends secure texts, photos, and and then deletes them from the recipient’s phone later. However, it is unusual that it also creates encrypted voice calls over wi-fi connections. Wiper is available free of charge for both Android and iOS (iPhone, iPad, and iPod Touch) devices. Most apps delete the messages a set time after they’re read, but Wiper lets you remove […]
After last year’s revelations about U.S. Internet surveillance raised interest in privacy tools, Google and Yahoo both announced they were working on software to let people who use their e-mail services easily exchange encrypted messages. Now a prototype browser extension called ShadowCrypt, made by researchers at the University of California, Berkeley, and the University of Maryland, goes even further. It makes it easy to send and receive encrypted text on […]
Apple provides free encryption software with every Macintosh. The functionality is built into Disk Utility, a multi-purpose program that can be found on every Mac. Disk Utility has many uses but for the moment I will only describe the encryption of files or folders. Disk Utility will encrypt any kind of file: text, images, videos, databases, anything at all. To encrypt a file or folder, first create the item(s) to […]