The Necessity of Protecting End-to-End Encryption

Amid the Covid-19 pandemic, with so much of our daily and professional life being reliant on online connectivity, internet privacy and security are more crucial now than ever. A great deal of internet privacy currently relies on the implementation of unadulterated end-to-end encryption, a system that ensures only the sender and receiver have the capability […]

Internet Privacy Has Become Even More Valuable During COVID Lockdown

With much of the country still under some form of lockdown due to COVID-19, communities are increasingly reliant upon the internet to stay connected. The coronavirus’ ability to relegate professional, political, and personal communications to the web underscores just how important end-to-end encryption has already become for internet privacy. During this unprecedented crisis, just like […]

Internet Privacy Has Become Even More Valuable During COVID-19 Lockdown

With much of the country still under some form of lockdown due to COVID-19, communities are increasingly reliant upon the internet to stay connected. The coronavirus’ ability to relegate professional, political, and personal communications to the web underscores just how important end-to-end encryption has already become for internet privacy. During this unprecedented crisis, just like […]

Privacy, Safety and Encryption

In the abstract, consumers welcome privacy but we also acknowledge that real-world tradeoffs may be inevitable between privacy and safety.  Most of us are at peace with surveillance of telephone and electronic records of suspected criminals or foreign spies.  If law enforcement lacks the information needed to target and halt unlawful threats, the public can […]

Encryption for Social Media and Email

Social media and email services are drifting toward the encryption of their clients’ information.  Consumers will prefer encryption for some of the information stored in their smartphones, laptops and tablets. US retail consumers’ attitude toward privacy is shaped by the belief that some in law enforcement snoop and by our loathing of hackers. A milder […]

The Coming Battle over Encrypt-Decrypt Certification

With disturbing frequency, cyberattacks on government institutions, infrastructure and commercial firms are being reported.  Attacks on government agencies seem to emanate from nation-state rivals such as Russia, China, and Iran.  The attacks are usually probes for intelligence on military strength or for design data on advanced military technologies.  Russia used this strategy to monitor Ukrainian […]