Dan Guido’s careful analysis provides the answers that we, and law-enforcement, wanted to know.
privacy
It turns out that Steam’s leak of personal data was very large, did contain sensitive personal information, and was the result of a denial of service attack. Has it been reported, though?
A single point of failure which discarded all privacy protection is hardly an example of good design.
Backdoors will be exploited, and can only result in unintentional consequences. They would put the economy and society at risk.
Accessible explanations of how AES encryption is performed, and how encryption works in iPhones and iPads.
Twenty years ago, law enforcement agencies wanted backdoor access to encrypted communications. Look what happened.
Rather than blathering on about surveillance, our politicians had better start preparing their excuses.
Could your HTTPS and VPN be so easy to crack that a well-prepared hacker could open your secure connections?
A free open source droplet for robust encryption and decryption, and explanation of the AppleScript code.
How to build commands to robustly encrypt and decrypt files on your Mac.
