Accessible explanations of how AES encryption is performed, and how encryption works in iPhones and iPads.
encryption
Twenty years ago, law enforcement agencies wanted backdoor access to encrypted communications. Look what happened.
Rather than blathering on about surveillance, our politicians had better start preparing their excuses.
Could your HTTPS and VPN be so easy to crack that a well-prepared hacker could open your secure connections?
A free open source droplet for robust encryption and decryption, and explanation of the AppleScript code.
How to build commands to robustly encrypt and decrypt files on your Mac.
How to use encryption to protect sensitive data on your laptop or removable storage media.
Benefits to the loss of privacy proposed in the UK are ebbing away as Internet behaviours change, but this is not considered in its justification. Is it too late?
Already it looks straightforward to circumvent the surveillance proposed. And you can rest assured the Bad Guys will.
