Ama Russell and Evamelo Oleita had never been to a protest before June. But as demonstrations against systemic racism and police brutality began to spread across the U.S. earlier this year, the two 17 year-olds from Michigan, both of whom are Black, were inspired to organize one of their own.
Seeking practical help, Oleita reached out to Michigan Liberation, a local civil rights group. The activist who replied told her to download the messaging app Signal. They were saying that to be safe, they were using Signal now, Oleita tells TIME. It turned out to be useful advice. I think Signal became the most important tool for protesting for us, she says.
Within a month, Oleita and Russell had arranged a nonviolent overnight occupation at a detention center on the outskirts of Detroit, in protest against a case where a judge had put a 15 year-old Black schoolgirl in juvenile detention for failing to complete her schoolwork while on probation. The pair used Signal to discuss tactics, and to communicate with their teams marshalling protestors and liaising with the police.
I dont think anything we say is incriminating, but we definitely dont trust the authorities, says Russell. We dont want them to know where we are, so they cant stop us at any point. On Signal, being able to communicate efficiently, and knowing that nothing is being tracked, definitely makes me feel very secure.
Signal is an end-to-end encrypted messaging service, similar to WhatsApp or iMessage, but owned and operated by a non-profit foundation rather than a corporation, and with more wide-ranging security protections. One of the first things you see when you visit its website is a 2015 quote from the NSA whistleblower Edward Snowden: I use Signal every day. Now, its clear that increasing numbers of ordinary people are using it too.
Any time there is some form of unrest or a contentious election, there seems to be an opportunity for us to build our audience, says Brian Acton, the Signal Foundations co-founder and executive chairman, in an interview with TIME. Its a little bit bittersweet, because a lot of times our spikes come from bad events. Its like, woohoo, were doing great but the worlds on fire.
Indeed, just as protests against systemic racism and police brutality intensified this year, downloads of Signal surged across the country. Downloads rose by 50% in the U.S. between March and August compared to the prior six months, according to data shared with TIME by the analysis firm App Annie, which tracks information from the Apple and Google app stores. In Hong Kong they rose by 1,000% over the same period, coinciding with Beijings imposition of a controversial national security law. (The Signal Foundation, the non-profit that runs the app, doesnt share official download numbers for what it says are privacy reasons.)
Were seeing a lot more people attending their first actions or protests this yearand one of the first things I tell them to do is download Signal, says Jacky Brooks, a Chicago-based activist who leads security and safety for Kairos, a group that trains people of color to use digital tools to organize for social change. Signal and other end-to-end encryption technology have become vital tools in protecting organizers and activists.
Read more: Young Activists Drive Peaceful Protests Across the U.S.
In June, Signal took its most explicitly activist stance yet, rolling out a new feature allowing users to blur peoples faces in photos of crowds. Days later, in a blog post titled Encrypt your face, the Signal Foundation announced it would begin distributing face masks to protesters, to help support everyone self-organizing for change in the streets. Asked if the chaos of 2020 has pushed Signal to become a more outwardly activist organization, Acton pauses. I dont know if I would say more, he says. I would say that right now its just congruent. Its a continuation of our ongoing mission to protect privacy.
Brian Acton speaks at the WIRED25 Summit November 08, 2019 in San Francisco, California.
Phillip Faraone/Getty Images for WIRED
Signals user base somewhere in the tens of millions, according to app store data is still a fraction of its main competitor WhatsApps, which has some 2 billion users and is owned by Facebook. But it is increasingly clear that among protesters, dissidents and investigative journalists, Signal is the new gold standard because of how little data it keeps about its users. At their core, both apps use cryptography to make sure that the messages, images and videos they carry can only be seen by the sender and the recipient not governments, spies, nor even the designers of the app itself. But on Signal, unlike on WhatsApp, your messages metadata are encrypted, meaning that even authorities with a warrant cannot obtain your address book, nor see who youre talking to and when, nor see your messages.
Historically, when an investigative journalists source is prosecuted in retaliation for something they have printed, prosecutors will go after metadata logs and call logs about whos been calling whom, says Harlo Holmes, the director of newsroom digital security at the Freedom of the Press Foundation.
WhatsApp states on its website that it does not store logs of who is messaging who, in the ordinary course of providing our service. Yet it does have the technical capacity to do so. In some cases including when they believe its necessary to keep users safe or comply with legal processes, they state, we may collect, use, preserve, and share user information including information about how some users interact with others on our service.
Signal, by contrast, cannot comply with law enforcement even if it wanted to. (Its not clear that it does: in early June, Signals founder and CEO Moxie Marlinspike tweeted ACAB All Cops Are Bastards in response to allegations that police had stockpiled personal protective equipment amid the pandemic.) In 2016, a Virginia grand jury subpoenaed Signal for data about a user, but because it encrypts virtually all its metadata, the only information Signal was able to provide in response was the date and time the user downloaded the app, and when they had last used it. Signal works very, very hard in order to protect their users by limiting the amount of metadata that is available in the event of a subpoena, Holmes says.
The approach has not won Signal fans in the Justice Department, which is supporting a new bill that would require purveyors of encrypted software to insert backdoors to make it possible for authorities to access peoples messages. Opponents say the bill would undermine both democracy and the very principles that make the app so secure in the first place. Ironically, Signal is commonly used by senior Trump Administration officials and those in the intelligence services, who consider it one of the most secure options available, according to reporters in TIMEs Washington bureau.
Signals value system aligns neatly with the belief, popular in Silicon Valleys early days, that encryption is the sole key to individual liberty in a world where authorities will use technology to further their inevitably authoritarian goals. Known as crypto-anarchism, this philosophy emerged in the late 1980s among libertarian computer scientists and influenced the thinking of many programmers, including Marlinspike. Crypto-anarchists thought that the one thing you can rely on to guarantee freedom is basically physics, which in the mid 1990s finally allowed you to build systems that governments couldnt monitor and couldnt control, says Jamie Bartlett, the author of The People vs Tech, referring to the mathematical rules that make good encryption so secure. They were looking at the Internet that they loved but they could see where it was going. Governments would be using it to monitor people, businesses would be using it to collect data about people. And unless they made powerful encryption available to ordinary people, this would turn into a dystopian nightmare.
Signal's founder Moxie Marlinspike during a TechCrunch event on September 18, 2017 in San Francisco, California.
Steve Jennings/Getty Images for TechCrunch
As a young adult in the 1990s, Marlinspike who declined to be interviewed for this story spent his life on the fringes of society, teaching himself computer science, messing with friends machines, and illegally hitching rides on freight trains across the United States. A tall white man with dreadlocks, he always had a distrust for authority, but Snowdens leaks appeared to crystallize his views. In a post published on his blog in June 2013, which is no longer accessible online, Marlinspike wrote about the danger these new surveillance capabilities posed when exercised by a state that you could not trust. Police already abuse the immense power they have, but if everyones every action were being monitored then punishment becomes purely selective, he wrote. Those in power will essentially have what they need to punish anyone theyd like, whenever they choose, as if there were no rules at all. But, Marlinspike argued, this problem was not unsolvable. It is possible to develop user-friendly technical solutions that would stymie this type of surveillance, he wrote.
By the time hed written that blog post, Marlinspike had already made an effort to build such a user-friendly technical solution. Called the Textsecure Protocol (later the Signal Protocol), it was a sort of recipe for strong end-to-end encryption that could ensure only the sender and recipient of a message were able to read its contents, and not authorities or bad actors wishing to pry. In 2010 Marlinspike launched two appsone for text messaging and another for phone callsbased on the protocol. In 2014 he merged them, and Signal was born.
The app was kept afloat thanks to nearly $3 million in funding from the Open Technology Fund, a Congress-funded nonprofit that finances projects aimed at countering censorship and surveillance. In keeping with security best practices, the Signal Protocol is open source, meaning that its publicly available for analysts around the world to audit and suggest improvements. (Signals other main competitor, Telegram, is not end-to-end encrypted by default, and security researchers have raised concerns about its encryption protocol, which unlike Signals is not open source.) But although by all accounts secure, Signal back in 2014 was hardly user-friendly. It had a relatively small user base, mostly made up of digital security geeks. It wasnt the kind of influence Marlinspike wanted.
Read more: How the Trump Administration is Undermining the Open Technology Fund
So Marlinspike sought out Acton, who had co-founded WhatsApp in 2009 along with Jan Koum. The pair had since grown it into the largest messaging app in the world, and in 2014 Facebook snapped it up for a record-setting $19 billion. Marlinspikes views on privacy aligned with theirs (Koum had grown up under the ever-present surveillance of Soviet Ukraine) and in 2016, with Facebooks blessing, they worked to integrate the Signal Protocol into WhatsApp, encrypting billions of conversations globally. It was a huge step toward Marlinspikes dream of an Internet that rejected, rather than enabled, surveillance. The big win is when a billion people are using WhatsApp and dont even know its encrypted, he told Wired magazine in 2016. I think weve already won the future.
But Acton, who was by now a billionaire thanks to the buyout, would soon get into an acrimonious dispute with Facebooks executives. When he and Koum agreed to the sale in 2014, Acton scrawled a note to Koum stipulating the ways WhatsApp would remain separate from its new parent company: No ads! No games! No gimmicks! Even so, while Acton was still at the company in 2016, WhatsApp introduced new terms of service that forced users, if they wanted to keep using the app, to agree that their WhatsApp data could be accessed by Facebook. It was Facebooks first step toward monetizing the app, which at the time was barely profitable.
Acton was growing alarmed at what he saw as Facebooks plans to add advertisements and track even more user data. In Sept. 2017, he walked away from the company, leaving behind $850 million in Facebook stock that would have vested in the coming months had he stayed. (As of September 2020, Facebook still hasnt inserted ads into the app.) Im at peace with that, Acton says of his decision to leave. Im happier doing what Im doing in this environment, and with the people that Im working with, he says.
Soon after quitting, Acton teamed up with Marlinspike once again. Each of them knew that while encrypting all messages sent via WhatsApp had been a great achievement, it wasnt the end. They wanted to create an app that encrypted everything. So Acton poured $50 million of his Facebook fortune into setting up the Signal Foundation, a non-profit that could support the development of Signal as a direct rival to WhatsApp.
Actons millions allowed Signal to more than treble its staff, many of whom now focus on making the app more user-friendly. They recently added the ability to react to messages with emojis, for example, just in time to entice a new generation of protesters like Oleita and Russell. And unlike others who had approached Signal offering funding, Actons money came with no requirements to monetize the app by adding trackers that might compromise user privacy. Signal the app is like the purest form of what Moxie and his team envisioned for the Signal Protocol, Holmes says. WhatsApp is the example of how that protocol can be placed into other like environments where the developers around that client have other goals in mind.
Although it was meant to be an alternative business model to the one normally followed in Silicon Valley, Signals approach bears a striking similarity to the unprofitable startups that rely on billions of venture capital dollars to build themselves up into a position where theyre able to bring in revenue. It hasnt been forefront in our minds to focus on donations right now, primarily because we have a lot of money in the bank, Acton says. And secondarily, because weve also gotten additional large-ish donations from external donors. So thats given us a pretty long runway where we can just focus on growth, and our ambition is to get a much larger population before doing more to solicit and engender donations. (Signal declined to share any information about the identities of its major donors, other than Acton, with TIME.)
Still, one important difference is that this business model doesnt rely on what the author Shoshana Zuboff calls Surveillance Capitalism: the blueprint by which tech companies offer free services in return for swaths of your personal data, which allow those companies to target personalized ads at you, lucratively. In 2018, as the Cambridge Analytica scandal was revealing new information about Facebooks questionable history of sharing user data, Acton tweeted: It is time. #deletefacebook. He says he still doesnt have a Facebook or Instagram account, mainly because of the way they target ads. To me, the more standard monetization strategies of tracking users and tracking user activity, and targeting ads, that all generally feels like an exploitation of the user, Acton says. Marketing is a form of mind control. Youre affecting peoples decision-making capabilities and youre affecting their choices. And that can have negative consequences.
Grafitti urging people to use Signal is spray-painted on a wall during a protest on February 1, 2017 at UC Berkeley, California.
Elijah Nouvelage/Getty Images
An even more sinister side effect of Surveillance Capitalism is the data trail it leaves behindand the ways authorities can utilize it for their own type of surveillance. Marlinspike wrote in 2013 that instead of tapping into phone conversations, changes in the nature of the Internet meant that [now,] the government more often just goes to the places where information has been accumulating on its own, such as email providers, search engines, social networks.
It was a surveillance technique Marlinspike and Acton knew WhatsApp was still vulnerable to because of its unencrypted metadata, and one they both wanted to disrupt. Its impossible to know how much user data WhatsApp alone provides to authorities, because Facebook only makes such data available for all its services combined bundling WhatsApp together with Instagram and the Facebook platform itself. (WhatsApps director of communications, Carl Woog, declined to provide TIME with data relating to how often WhatsApp alone provides user data to authorities.) Still, those aggregate data show that in the second half of 2019, Facebook received more than 51,000 requests from U.S. authorities for data concerning more than 82,000 users, and produced some data in response to 88% of those requests. By contrast, Signal tells TIME it has received no requests from law enforcement for user data since the one from the Virginia grand jury in 2016. I think most governments and lawyers know that we really dont know anything, a Signal spokesperson tells TIME. So why bother?
Another reason, of course, is that Signal has far, far fewer users than WhatsApp. But Acton also puts it down to Signals broader application of encryption. They can do that type of stuff on WhatsApp because they have access to the sender, the receiver, the timestamp, you know of these messages, Acton says. We dont have access to that on Signal. We dont want to know who you are, what youre doing on our system. And so we either dont collect the information, dont store the information, or if we have to, we encrypt it. And when we encrypt it, we encrypt it in a way that were unable to reverse it.
Despite those inbuilt protections, Signal has still come under criticism from security researchers for what some have called a privacy flaw: the fact that when you download Signal for the first time, your contacts who also have the app installed get a notification. Its an example of one tradeoff between growth and privacy where despite its privacy-focused image Signal has come down on the side of growth. After all, youre more likely to use the app, and keep using it, if you know which of your friends are on there too. But the approach has been questioned by domestic violence support groups, who say it presents a possible privacy violation. Tools such as Signal can be incredibly helpful when used strategically, but when the design creates an immediate sharing of information without the informed consent of the user, that can raise potentially harmful risks, says Erica Olsen of the National Network to End Domestic Violence. Survivors may be in a position where they are looking for a secure communication tool, but dont want to share that fact with other people in their lives. Signal says that its possible to block users to solve problems like this. Its also working on a more long-term fix: allowing a user to connect with others without sharing their numberthough theyll still need a phone number to sign up to the app.
Since the 1990s, encryption has faced threats from government agencies seeking to maintain (or strengthen) their surveillance powers in the face of increasingly secure code. But though it appeared these so-called crypto wars were won when strong encryption became widely accessible, Signal is now under threat from a new salvo in that battle. The Justice Department wants to amend Section 230 of the Communications Decency Act, which currently allows tech companies to avoid legal liability for the things users say on their platform. The proposed change is in part a retaliation by President Trump against what he sees as social media platforms unfairly censoring conservatives, but could threaten encrypted services too. The amendment would mean companies would have to earn Section 230s protections by following a set of best practices that Signal says are extraordinarily unlikely to allow end-to-end encryption.
Read more: Facebook Cannot Fix Itself. But Trumps Effort to Reform Section 230 Is Wrong
Even if that amendment doesnt pass, the Justice Department is supporting a different bill that would force outfits like Signal to build backdoors into their software, to allow authorities with a warrant their own special key to decrypt suspects messages. While strong encryption provides enormous benefits to society and is undoubtedly necessary for the security and privacy of Americans, end-to-end encryption technology is being abused by child predators, terrorists, drug traffickers, and even hackers to perpetrate their crimes and avoid detection, said Attorney General William Barr on June 23. Warrant-proof encryption allows these criminals to operate with impunity. This is dangerous and unacceptable.
Theres no denying that encrypted apps are used for evil as well as good, says Jeff Wilbur, the senior director for online trust at the Internet Society, a nonprofit that campaigns for an open Internet. But, he says, the quirk of mathematics that guarantees security for end-to-end encryptions everyday usersincluding vulnerable groups like marginalized minorities, protesters and victims of domestic abuseis only so powerful because it works the same for all users. The concept of only seeing one suspected criminals data, with a warrant, sounds great, Wilbur says. But the technical mechanism youd have to build into the service to see one persons data can potentially let you see any persons data. Its like having a master key. And what if a criminal or a nation state got a hold of that same master key? Thats the danger.
Even in a world with perfect corporations and unimpeachable law enforcement, it would be a difficult tradeoff between privacy and the rule of law. Add distrust of authorities and Surveillance Capitalism into the mix, and you arrive at an even trickier calculation about where to draw the line. The problem is, ordinary people rely on rules and laws to protect them, says Bartlett, the author of The People vs Tech. The amount of times people get convicted on the basis of the government being able to legally acquire communications that prove guilt its absolutely crucial.
But at the same time, governments have regularly proved themselves willing and able to abuse those powers. I do blame the government for bringing it on themselves, Bartlett says. The revelations about what governments have been doing have obviously helped stimulate a new generation of encrypted messaging systems that people, rightly, would want. And it ends up causing the government a massive headache. And its their fault because they shouldnt have been doing what they were doing.
Still, despite the existential risk that a law undermining encryption would pose for Signal, Acton says he sees the possibility as just a low medium threat. Id be really surprised if the American public were to pass a law like this that stood the test of time, he says. If that were to happen, he adds, Signal would try to find ways around the law possibly including leaving the U.S. We would continue to seek to own and operate our service. That might mean having to reincorporate somewhere.
In the meantime, Signal is more focused on attracting new users. In August, the nonprofit rolled out a test version of its desktop app that would allow encrypted video calling an attempt to move into the lucrative space opened up by the rise in home working due to the pandemic. I try to use it to conduct my interview with Acton, but the call fails to connect. When I get through on Google Hangouts instead, I see him scribbling notes at his desk. Just this interaction alone gave me a couple ideas for improvements, he says excitedly.
The episode reveals something about how Acton sees Signals priorities. Our responsibility is first to maintain the highest level of privacy, and then the highest quality product experience, he says. Our attempt to connect on Signal desktop was to me, thats a fail. So its like, okay, well go figure it out.
Correction: Sept. 28
The original version of this story misstated Marlinspikes 1990s-era computer activity. He did not hack into insecure servers, he messed with friends computers as a prank. It also misstated an upcoming Signal feature. Signal is working on a way for users to contact others without providing their phone number, but users will still need to provide a phone number to sign up for the app.
Thank you! For your security, we've sent a confirmation email to the address you entered. Click the link to confirm your subscription and begin receiving our newsletters. If you don't get the confirmation within 10 minutes, please check your spam folder.
Write to Billy Perrigo at billy.perrigo@time.com.
Read more here:
The Inside Story of How Signal Became the Private Messaging App for an Age of Fear and Distrust - TIME
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]