Do You Have To Sacrifice Privacy For Cloud Storage?

Do You Have To Sacrifice Privacy For Cloud Storage?

Having everything on the cloud (i.e. cloud storage) is great; it means you don't have to remember if you saved that document on your desktop or laptop. You can also access your files from any computer connected to the internet, as well as not worry about what happens...

The Problem With Encryption Backdoors

The Problem With Encryption Backdoors

There has been a debate going on for quite a while as to whether or not companies should implement backdoors into their encryption. While there are many valid points from both sides, backdoors would cause more problems than they solve. What Are Encryption Backdoors?...

Why We Need End-to-end Encryption

Why We Need End-to-end Encryption

At the same time everyone is concerned with how companies use their data, we're moving towards an era where virtually everything will be done in the cloud. No longer will we need expensive computers with tons of processing power, and no longer will we need to remember...

Asymmetric Encryption

Asymmetric Encryption

When you think of the term “encryption”, you’re likely thinking of what is known as symmetric encryption. With symmetric encryption, you encrypt data with a password, and use the same exact password when you need to decrypt the data. This works fine when you’re...

How Secure Is Your iPhone?

How Secure Is Your iPhone?

We all spend more time than we care to admit staring at our iPhone screens and mindlessly typing away. Everything from contacts to messages and images are things we would rather not have the world see. Boot Process The iPhone is designed with security in mind,...

The No Encryption Dystopia

The No Encryption Dystopia

Yet again, the US government is proposing that “warrant-proof” encryption be made illegal. Attorney General Barr essentially states that encryption as it currently stands allows criminals to completely hide their communications from the government. While that...

The Problems With End-to-end Encryption

The Problems With End-to-end Encryption

What Is End-to-end Encryption? End-to-end encryption is a way to ensure only the sender and recipient of a message can see it. The message is encrypted on the sender’s device and can only be decrypted once it reaches the recipient. Although the message may be sent...

How Secure Is iCloud?

How Secure Is iCloud?

iCloud is what makes all the magical features of backups and syncing happen, on Apple devices anyways. But, just how secure is your information stored in Apple’s cloud? “In Transit” vs “At Rest” These two terms are rather important for understanding the remainder...

How Secure is Apple’s iMessage?

How Secure is Apple’s iMessage?

Of all large tech companies, Apple seems to have a pretty good track record of respecting and protecting the privacy of their users. But, iMessage in particular may be a different story. Before I continue, it’s important to mention that this only applies to iMessage...

The Need For Strong Encryption

The Need For Strong Encryption

Yet again, there is at least talk in the United States government of a ban on end-to-end encryption. The premise for such a ban is that certain forms of encryption make it impossible for the FBI, NSA, and other government agencies to do their job properly,...

Newsletter

Sign up here to be one of the first to know when we publish a post, as well as other exclusive blog updates.