Find Command Cheat Sheet » Free from Linux Training Academy » Download Now!
Welcome Guest | Sign In
LinuxInsider.com

Results 1-20 of 66 for PGP (0.001 secs).

Searching: Articles | Discussions

Sorted by Date | Sort by Relevance

John P. Mello Jr.
Code Cracker Turing to Be on 50-Quid Notes
07/16/19 12:09 PM PT | TechNewsWorld | 1038 Words

Turing shortened the war, said Phil Zimmermann, author of the PGP encryption program and an associate professor at the Delft University of Technology in the Netherlands.

"We would have had a very different experience in the Normandy invasion if we didn't...

John P. Mello Jr.
Mozilla Offers Free Secure File-Sharing Service
03/13/19 5:00 AM PT | TechNewsWorld | 999 Words

"It's an interesting product," said Phil Zimmermann, creator of PGP encryption and an associate professor at Delft University of Technology in the Netherlands.

"It's certainly better than a service that uploads files without encryption," he told TechNewsWorld, "or uploads encrypted files...

Richard Adhikari
Upcoming iOS Access Restrictions Could Stymie Law Enforcement
06/16/18 5:00 AM PT | TechNewsWorld | 535 Words

"I don't think [USB Restricted Mode] is aimed at law enforcement agencies, however severe the impact to those entities may be," Webroot's Abrams said, likening the feature to PGP .

Loss of Perspective?
USB Restricted Mode "supports our right...

John P. Mello Jr.
Highly Sensitive Encrypted Email at Risk of Exposure
05/15/18 9:36 AM PT | TechNewsWorld | 661 Words

... newfound flaw in email clients that use PGP and S/MIME to encrypt messages can be exploited to expose the plain text of the missives, according to a paper published Monday. By injecting malicious snippets of text into encrypted messages, attackers can use...

Jack M. Germain
Google Invites Open Source Devs to Give E2EMail Encryption a Go
03/04/17 10:40 AM PT | LinuxInsider | 797 Words

It replaces the problematic web-of-trust model traditionally used with PGP , they pointed out.

"Google announced end-to-end email encryption almost three years ago, and no product or solution ever materialized," said Morey Haber, vice president of technology at BeyondTrust .

"With...

Richard Adhikari
ProtonMail Launches Encrypted Email for iOS, Android
03/18/16 5:00 AM PT | TechNewsWorld | 614 Words

ProtonMail's encryption is fully compatible with PGO, "because PGP has withstood the test of time -- over 20 years now -- and is well trusted and vetted by the community," Yen said.

Other Secure Email Systems
Several other secure...

Richard Adhikari
Keybase Releases Encrypted File-Sharing iPhone App
02/08/16 10:43 AM PT | TechNewsWorld | 661 Words

The system "is a lot less complex than PGP keys and far harder to compromise, particularly with man-in-the-middle exploits," observed Rob Enderle, principal analyst at the Enderle Group .

However, sync products "are generally more convenient, particularly if you're offline a...

Jack M. Germain
Linux Foundation Security Checklist: Have It Your Way
09/06/15 4:15 PM PT | LinuxInsider | 1076 Words

Among them are running automatic operating system updates, disabling the SSH server on the workstation, storing authentication, having signing and encryption keys on smartcard devices, and putting PGP master keys on removable storage.

There are moderate and low severity guidelines for Web-surfing...

Richard Adhikari
Cameron Takes Hard Line on Encrypted Communications
01/15/15 3:03 PM PT | TechNewsWorld | 641 Words

"Anyone in the UK or out of it could use freely available alternatives" like PGP and OTR to secure their communications, the EFF's O'Brien noted. Banning encrypted apps "would devastate their industry's trust in online communications, leading to a mass exodus of...

John P. Mello Jr.
Apple Fills iOS 8 Security Basket to Brim
09/19/14 7:07 AM PT | TechNewsWorld | 775 Words

"A four-digit PIN is easy to exhaust," Phil Zimmermann , author of one of the most widely used encryption systems in the world, PGP , told TechNewsWorld. "It's only 10,000 possibilities. That's ridiculously small."

However, combining the PIN with the UID...

John P. Mello Jr.
Is Open Source an Open Invitation to Hack Webmail Encryption?
08/21/14 11:21 AM PT | TechNewsWorld | 1305 Words

Such discoveries shouldn't be a cause of concern, argued Phil Zimmermann, creator of PGP , the encryption scheme Yahoo and Google will be using for their webmail.

"If someone does find a bug and sits on it, someone else will find the...

John P. Mello Jr.
Yahoo, Google Team Up to Fight Email Snoops
08/13/14 6:20 AM PT | E-Commerce Times | 768 Words

That's a risk worth taking, according to Phil Zimmermann, creator of PGP , or pretty good privacy -- the encryption method to be used by Yahoo and Google.

"The benefits of having everyone else look at it far outweigh the problem...

Richard Adhikari
BlackBerry Unveils BBM Protected to, Ahem, Protect Market Share
06/18/14 12:45 PM PT | E-Commerce Times | 607 Words

BlackBerry, whose share of the mobile phone market has been on a downward spiral, this week launched BBM Protected, the first...

Richard Adhikari
Google Releases Email Encryption Tool Alpha
06/06/14 5:00 AM PT | TechNewsWorld | 645 Words

These are supported only in GnuPG 2.1 and later, as well as Symantec's PGP software, Google said.

End-to-End supports RFC 4880, the OpenPGP Message Format, and RFC 6637, Elliptic Curve Cryptography, in OpenPGP.

The source code is built on a JavaScript...

Richard Adhikari
Snowden's Beloved Tails OS Reaches v1.0 Milestone
05/01/14 2:29 PM PT | LinuxInsider | 604 Words

Tails "is a nicely packaged distribution of common security tools like Tor and PGP," Daniel Castro, senior analyst at The Information Technology & Innovation Foundation , told LinuxInsider. "All of this is available today."

In fact, the developers admit Tails...

Katherine Noyes
Wiliest Ways to Keep the NSA at Bay
02/28/14 3:36 PM PT | LinuxInsider | 1326 Words

'They're Capturing Your Browsing'
"I'd recommend making phone calls with Silent Phone," Zimmermann suggested, and "for email, PGP , GnuPG or something like it."

As for other online activities, "there's a lot of things you do on the Internet...

Richard Adhikari
Kaspersky Details Sophisticated 'Mask' Robber Ops
02/11/14 2:41 PM PT | TechNewsWorld | 608 Words

It can intercept network traffic, keystrokes, Skype conversations and PGP keys, according to Kaspersky. Mask also can analyze WiFi traffic, fetch information from Nokia devices, capture screens and monitor file operations.

It's likely that the Nokia phones were specifically included because...

Katherine Noyes
The Blackphone vs. the NSA
01/20/14 9:19 AM PT | LinuxInsider | 1391 Words

"Blackphone is the world's first smartphone to put privacy and control ahead of everything else," according to the website for the project, which is led by none other than PGP creator and privacy guru Phil Zimmermann, along with Silent Circle and Geeksphone.

Patrick Nelson
How to Encrypt Your Email
12/05/13 5:00 AM PT | TechNewsWorld | 630 Words

Open source versions of Zimmermann's original PGP, called OpenPGP, have been adapted by some email service vendors.

How It Works
PGP encrypts a message using a symmetric encryption algorithm -- symmetric key algorithms are a shared secret between parties.

Patrick Nelson
Silent Text: Basic Anonymity at a Hefty Price
11/08/13 5:00 AM PT | LinuxInsider | 563 Words

The voice or phone app uses the ZRTP key agreement protocol designed by the creator of PGP , or Pretty Good Privacy -- a guy called Phil Zimmermann who is widely regarded as the father of encrypted communication tools.

What Is...

1 2 3 4 Next

Search for: In:

Which type of online advertising is most likely to attract your favorable attention?
Straightforward display ads
Ads based on my interests
Informational articles on products/services
Video ads
Ads designed to grab my attention, e.g. pop-ups, autoplay
None -- I avoid all online ads