Revision history for encryption
Additions:
~-[[https://rumble.com/v52cc3w-end-to-end-encryption-e2e-is-dead.-killed-by-new-tech..html End-to-End Encryption (E2E) is Dead. Killed By New Tech.]] {w.r.t. Windows, Android, and iOS operating systems}
~~-[[http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance Bruce Schneier]]
~~-[[http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance Bruce Schneier]]
Deletions:
~~-[[http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance Bruce Schnier]]
Additions:
~-[[https://distrowatch.com/weekly.php?issue=20240819#qa Dual-Booting with Encryption]]
Additions:
>>Process of disguising information as “ciphertext,” or data that will be unintelligible to an unauthorized person. Decryption is the process of converting ciphertext back into its original format, sometimes called plaintext (see cryptography). Computers encrypt data by applying an algorithm to a block of data. A personal key known only to the message's transmitter and intended receiver is used to control the encryption. Well-designed keys are almost impregnable. A key 16 characters long selected at random from 256 ASCII characters could take far longer than the 15-billion-year age of the universe to decode, assuming the perpetrator attempted 100 million different key combinations per second. Symmetric encryption requires the same key for both encryption and decryption. Asymmetric encryption, or public-key cryptography, requires a pair of keys, one for encryption and one for decryption. [[http://www.merriam-webster.com/concise/data+encryption?show=0&t=1378894662 Encyclopædia Britannica Concise]]>>
Deletions:
Additions:
~-https://getsession.org/
Additions:
---
{{nocomments}}
{{nocomments}}
Additions:
~-[[https://rumble.com/v52cc3w-end-to-end-encryption-e2e-is-dead.-killed-by-new-tech..html End-to-End Encryption (E2E) is Dead. Killed By New Tech.]]
Deletions:
Additions:
~-https://rumble.com/v52cc3w-end-to-end-encryption-e2e-is-dead.-killed-by-new-tech..html
Additions:
~-Is your encrypted data safe?:
~~-Katherine Albrecht [[http://podcast.gcnlive.com/podcast/k_albrecht/0907131.mp3 mp3]][1] [[http://podcast.gcnlive.com/podcast/k_albrecht/0909132.mp3 mp3]][2]
~~-[[http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance Bruce Schnier]]
~~-Katherine Albrecht [[http://podcast.gcnlive.com/podcast/k_albrecht/0907131.mp3 mp3]][1] [[http://podcast.gcnlive.com/podcast/k_albrecht/0909132.mp3 mp3]][2]
~~-[[http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance Bruce Schnier]]
Deletions:
Additions:
~-Is your encrypted data safe?: Katherine Albrecht [[http://podcast.gcnlive.com/podcast/k_albrecht/0907131.mp3 mp3]][1] [[http://podcast.gcnlive.com/podcast/k_albrecht/0909132.mp3 mp3]][2] | [[http://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance Bruce Schnier]]
~-http://blog.cryptographyengineering.com/2013/03/here-come-encryption-apps.html
~-http://blog.cryptographyengineering.com/2013/03/here-come-encryption-apps.html
Deletions:
Additions:
~-Is your encrypted data safe?: [[http://podcast.gcnlive.com/podcast/k_albrecht/0907131.mp3 mp3]][1] [[http://podcast.gcnlive.com/podcast/k_albrecht/0909132.mp3 mp3]][2]
Deletions:
Additions:
~-Is your encrypted data safe?: [[http://podcast.gcnlive.com/podcast/k_albrecht/0907131.mp3 mp3]]1 [[http://podcast.gcnlive.com/podcast/k_albrecht/0909132.mp3 mp3]]2
Deletions:
No Differences
Additions:
====**Data Encryption**====
Deletions:
Additions:
- [[gnupg GNU Privacy Guard]]
Deletions:
Additions:
===Personal Communication Encryption===
Deletions:
Additions:
>>Process of disguising information as “ciphertext,” or data that will be unintelligible to an unauthorized person. Decryption is the process of converting ciphertext back into its original format, sometimes called plaintext (see cryptography). Computers encrypt data by applying an algorithm to a block of data. A personal key known only to the message's transmitter and intended receiver is used to control the encryption. Well-designed keys are almost impregnable. A key 16 characters long selected at random from 256 ASCII characters could take far longer than the 15-billion-year age of the universe to decode, assuming the perpetrator attempted 100 million different key combinations per second. Symmetric encryption requires the same key for both encryption and decryption. Asymmetric encryption, or public-key cryptography, requires a pair of keys, one for encryption and one for decryption.[[http://www.merriam-webster.com/concise/data+encryption?show=0&t=1378894662 Encyclopædia Britannica Concise]]>>
Deletions:
Additions:
====**data encryption**====
>>Process of disguising information as “ciphertext,” or data that will be unintelligible to an unauthorized person. Decryption is the process of converting ciphertext back into its original format, sometimes called plaintext (see cryptography). Computers encrypt data by applying an algorithm to a block of data. A personal key known only to the message's transmitter and intended receiver is used to control the encryption. Well-designed keys are almost impregnable. A key 16 characters long selected at random from 256 ASCII characters could take far longer than the 15-billion-year age of the universe to decode, assuming the perpetrator attempted 100 million different key combinations per second. Symmetric encryption requires the same key for both encryption and decryption. Asymmetric encryption, or public-key cryptography, requires a pair of keys, one for encryption and one for decryption.>>
>>Process of disguising information as “ciphertext,” or data that will be unintelligible to an unauthorized person. Decryption is the process of converting ciphertext back into its original format, sometimes called plaintext (see cryptography). Computers encrypt data by applying an algorithm to a block of data. A personal key known only to the message's transmitter and intended receiver is used to control the encryption. Well-designed keys are almost impregnable. A key 16 characters long selected at random from 256 ASCII characters could take far longer than the 15-billion-year age of the universe to decode, assuming the perpetrator attempted 100 million different key combinations per second. Symmetric encryption requires the same key for both encryption and decryption. Asymmetric encryption, or public-key cryptography, requires a pair of keys, one for encryption and one for decryption.>>
Additions:
- [[gnupg GNU Privacy Guard]] ##+[[libgcrypt]]##
Deletions:
===Encryption Libraries===
- [[gnupg]]
- [[gnutls]]
- [[libgcrypt]]
Additions:
- [[gnupg GNU Privacy Guard]]
Deletions:
Additions:
===Appendix===
~-[[http://podcast.gcnlive.com/podcast/k_albrecht/0907131.mp3 Is your encrypted data safe?]]
~-[[http://distrowatch.com/weekly.php?issue=20120528#qa Questions and Answers (by Jesse Smith): What are the advantages of encrypting and should the entire system be encrypted rather than just /home?]]
~-[[http://podcast.gcnlive.com/podcast/k_albrecht/0907131.mp3 Is your encrypted data safe?]]
~-[[http://distrowatch.com/weekly.php?issue=20120528#qa Questions and Answers (by Jesse Smith): What are the advantages of encrypting and should the entire system be encrypted rather than just /home?]]
Deletions:
- [[HighVIP]]
---
==Appendix==
~[[http://distrowatch.com/weekly.php?issue=20120528#qa Questions and Answers (by Jesse Smith): What are the advantages of encrypting and should the entire system be encrypted rather than just /home?]]
---
Deletions:
Additions:
==Appendix==
Additions:
~[[http://distrowatch.com/weekly.php?issue=20120528#qa Questions and Answers (by Jesse Smith): What are the advantages of encrypting and should the entire system be encrypted rather than just /home?]]
Deletions:
No Differences
Additions:
~-https://duckduckgo.com/
~[[http://distrowatch.com/weekly.php?issue=20120528#qa]]
---
~[[http://distrowatch.com/weekly.php?issue=20120528#qa]]
---
Deletions:
- [[nettle]]
- [[openssl]]
http://distrowatch.com/weekly.php?issue=20120528#qa
No Differences
No Differences
Additions:
http://distrowatch.com/weekly.php?issue=20120528#qa
Additions:
- [[Pidgin]] with Off-the-Record (O.T.R.) Messaging
Deletions:
Additions:
- [[ccrypt]]
- TrueCrypt
- TrueCrypt
Deletions:
TrueCrypt
Additions:
- [[Pidgin]] with OTR
- [[Thunderbird]] with [[Enigmail]]
- [[HighVIP]]
- https://ssl.scroogle.org/
- https://www.startpage.com/
- [[gnupg]]
- [[gnutls]]
- [[libgcrypt]]
- [[nettle]]
- [[openssl]]
- [[Thunderbird]] with [[Enigmail]]
- [[HighVIP]]
- https://ssl.scroogle.org/
- https://www.startpage.com/
- [[gnupg]]
- [[gnutls]]
- [[libgcrypt]]
- [[nettle]]
- [[openssl]]
Deletions:
[[Thunderbird]] with [[Enigmail]]
[[HighVIP]]
https://ssl.scroogle.org/
https://www.startpage.com/
[[gnupg]]
[[gnutls]]
[[libgcrypt]]
[[nettle]]
[[openssl]]
Additions:
[[Pidgin]] with OTR
[[Thunderbird]] with [[Enigmail]]
[[Thunderbird]] with [[Enigmail]]
Deletions:
Additions:
[[gnupg]]
Additions:
[[Enigmail]]
Additions:
===File Encryption===
===Partition Encryption===
===Partition Encryption===
Deletions:
===Disk & Partition Encryption===
Additions:
===File & Directory Encryption===
===Disk & Partition Encryption===
===Disk & Partition Encryption===
Deletions:
===Disk Encryption===
Additions:
[[libgcrypt]]
Deletions:
Additions:
[[ccrypt]]
[[gnutls]]
[[libgcrypt]
[[nettle]]
[[openssl]]
[[gnutls]]
[[libgcrypt]
[[nettle]]
[[openssl]]
Deletions:
OpenSSL
GnuTLS
[[libgcrypt]]
Deletions:
Additions:
http://puppylinux.org/wikka/
[[HighVIP]]
[[HighVIP]]