Tag Archives: encryption

Van Hollen, Raskin, Flowers, twenty other MD candidates respond to MCCRC/Peace Action questionnaire

Twenty three candidates for Senate and 3d, 6th, and 8th Congressional District Representative seats have responded to a 13 part questionnaire circulated by MCCRC and Peace Action Montgomery.  The questionnaire and links to election pages and candidate questionnaire pages can … Continue reading

Posted in Post | Tagged , , , , , , , , , , , , , , , , | Leave a comment

Now that was an EPIC crypto-party

Better late than never: here’s a report back from the “crypto party” hosted by Electronic Privacy Information Center (EPIC) and Public Citizen on Friday, October 25th in the offices of Public Citizen in connection with the “Stop Watching Us”rally against … Continue reading

Posted in Post, Video | Tagged , , | 3 Comments

Protect Your Digital Privacy: People Power with PGP

If one were looking for an example of how one person was able to change the world for the better with technology, one need look no farther than Philip Zimmerman. Zimmerman earned his place in history in 1991, when he … Continue reading

Posted in Post | Tagged , , , | 4 Comments

Protect Your Digital Privacy: Email Pt. 1 (S/MIME)

Using encryption for correspondence in America is older than the country and as American as apple pie, so much so that Thomas Jefferson even invented an encryption device during the Revolution and later used it for dispatches while he was … Continue reading

Posted in Post | Tagged , , , , | 2 Comments

Protect Your Digital Privacy: WiFi

Coffee houses have a historical caché as the place where revolutions are born, but today they are also one of the easiest places for the authorities or others to eavesdrop on your electronic communications. Broadband wireless, or WiFi, is not … Continue reading

Posted in Post | Tagged , , , , , , | 1 Comment

Protect Your Digital Privacy: Passwords

In George Orwell’s 1984, Winston Smith finally comes undone and betrays the person about whom he cares most when he is confronted with the thing of which he is most afraid. No matter how otherwise secure an encryption algorithm is, … Continue reading

Posted in Post | Tagged , , , , , , | 3 Comments