| Hardware Security Modules (HSMs) are electronic devices using various hardware protection schemes against unauthorized reading of the secret...
| Hardware Security Modules (HSMs) are electronic devices using various hardware protection schemes against unauthorized reading of the secret...
| We all understand the need to encrypt messages and documents. But how did we get to today's encryption technologies, how do they work, and h...
| In the previous article in our series of projects on DIY highly secure communications [1], it was shown how to build a secure tamper-evident...
| In the same week British Prime Minister Cameron proposed a ban on encryption “to keep our people safe”, Der Spiegel revealed that the NSA us...
| CyanogenMod, a community built distribution of Android, has teamed up with Open WhisperSystems to provide user friendly cross-platform encry...
| As the recent NSA leaks highlight the importance of privacy enhancing tools, Adafruit presents the Onion Pi. This DIY project explains how s...
| Privacy enhancing tools have a bad reputation when it comes to usability. Nathan Freitas of The Guardian Project demonstrated easy to use ap...