CIA controlled global encryption company for decades, says report

CIA controlled global encryption company for decades, says report

Encryption weaknesses added to products sold by Crypto AG allowed the CIA and its German counterpart, the BND, to eavesdrop on adversaries and allies alike while earning million of dollars from the sales, according the Washington Post and the German public broadcaster ZDF, based on the agencies’ internal histories of the intelligence operation.

Swift Crypto helps more developers than ever to build secure applications

Swift Crypto helps more developers than ever to build secure applications

Apple has introduced a new open-source Swift Crypto package which makes the secure capabilities of Apple’s CryptoKit available to the wider Swift community — even if they’re deploying their software on platforms other than Apple’s own.

AI Proving to Be an Integral Part of Cryptocurrency High Volume Transaction Security

AI Proving to Be an Integral Part of Cryptocurrency High Volume Transaction Security

Crypto mining | Image source: PixabayBlockchain technology can decentralize the process of transferring money by making transactions transparent and allowing the community of users to verify them.

Why Facebook Privacy is a Hoax? Facebook censoring crypto-related messages

Why Facebook Privacy is a Hoax? Facebook censoring crypto-related messages

Maybe Facebook is happy enough by being able to read your SMS and your call history on Android devices. Facebook has been collecting call history and SMS data from Android devices. Facebook just made some big privacy promises, and they all hinge on encryption.

Microsoft Confirms Intent To Replace Windows 10 Passwords For 800 Million Users

Microsoft Confirms Intent To Replace Windows 10 Passwords For 800 Million Users

Microsoft's crypto, identity and authentication team group manager, Yogesh Mehta, has made an announcement that he says puts "the 800 million people who use Windows 10 one step closer to a world without passwords."

Tor Accepts Dash Donations, Advancing Privacy Initiative

Tor Accepts Dash Donations, Advancing Privacy Initiative

The Tor Project is now accepting donations in Dash and eight other cryptocurrencies to fund the initiative of increasing individuals’ privacy for “protection against tracking, surveillance, and censorship”. These features help Dash better service consumers that wish to maintain their privacy, which makes it a great pairing for Tor donations.

How the NSA Spies on Us All – Part 4: The 90’s – Present

How the NSA Spies on Us All – Part 4: The 90’s – Present

Enter the TAO ( Up until 1998, the NSA had been a, that was tasked with cryptography (enemy code breaking), passive collection of SIGINT, intelligence production for other agencies, and defense of American and Five Eyes networks.

Split Key Cryptography is Back… Again – Why Government Back Doors Don’t Work

Split Key Cryptography is Back… Again – Why Government Back Doors Don’t Work

3. Security Impact – The creation of EXPORT grade ciphers led to software that would support both regular cryptography and weakened cryptography in order to support legacy systems, which persisted long after governments decided that regulating crypto was a bad idea and dialed back their rules.

Katzenpost — Katzenpost documentation

Katzenpost — Katzenpost documentation

“An especially problematic excision of the political is the marginalization within the cryptographic community of the secure-messaging problem, an instance of which was the problem addressed by David Chaum .

Open Quantum Safe

Open Quantum Safe

The field of quantum-safe cryptography, also called post-quantum or quantum-resistant cryptography, aims to construct public key cryptosystems that are believed to be secure even against quantum computers. The goal of the Open Quantum Safe (OQS) project is to support the development and prototyping quantum-resistant cryptography.

How Crypto-Anarchy Can Help You To Reclaim Your Privacy, Personal Liberty, and Financial Sovereignty

How Crypto-Anarchy Can Help You To Reclaim Your Privacy, Personal Liberty, and Financial Sovereignty

Since crypto-anarchists do not want government agencies or anyone else or that matter, knowing what they are up to they utilise privacy-enhancing technologies to communicate, peer-to-peer networks to engage in commerce and cryptocurrencies to transact.