<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=805153362943600&amp;ev=PageView&amp;noscript=1">

Why having encryption backdoors is a very bad idea?

[fa icon="calendar'] Dec 16, 2016 3:44:58 PM / by Stefan Topuzov

One of the things that we at Secure Group like to emphasize the most is that there are no backdoors to access our products. Why is this such a big deal? The short answer is that backdoored encryption algorithms are compromised by definition, as they feature a weakness that is known to a third party – which defeats the purpose of encryption by default. The long answer is below.

Read More ...

[fa icon="comment"] 0 Comments

Is there a tide of mass surveillance rising? Here’s how to prepare

[fa icon="calendar'] Nov 25, 2016 4:43:51 PM / by Stefan Topuzov

Edward Snowden once made the point that the reality of mass surveillance is always one election away. The technology to undertake it is already available and the privacy protection laws are like a duct-tape holding the floodgates – all you need is one 9/11 type of event and the tape will be done away with. But what could you do to preserve privacy when that happens?

Read More ...

[fa icon="comment"] 0 Comments

Why a Trump presidency could mean bad news for online privacy

[fa icon="calendar'] Nov 11, 2016 4:34:37 PM / by Stefan Topuzov

The ballots were cast, the votes were counted and the winner is clear: Donald J. Trump will serve as the 45th President of the United States of America. The question everyone is asking now is how will he run the country. On many issues the answers are not yet certain. Online privacy doesn't seem to be one of them.

Read More ...

[fa icon="comment"] 0 Comments

Did the NSA really break Diffie-Hellman? Not quite

[fa icon="calendar'] Oct 31, 2016 9:40:06 AM / by Stefan Topuzov

If you have any interest in the topics of online privacy, surveillance and encryption, you can’t have missed this month’s big news: a team of scientists simulated how the National Security Agency (NSA) could have broken into trillions of encrypted communications, boiling it down to exploiting backdoors into how the Diffie-Hellman key exchange algorithm is implemented.

Read More ...

[fa icon="comment"] 0 Comments

  • SecureGroup
  • SecureGroup

Recent Posts

Some additional information in one line