I know, encryption is a word that sounds like Superman is talking to Ironman in the 22nd century on a faraway planet. But in fact, encryption has been used as a security measure since ancient times, first by the Egyptians, the Israelites and the Mayans, then the Greeks and the Romans. It is the technique of turning plain text into unintelligible text so that its original meaning becomes hard or impossible to figure out unless one knows what way it was altered. A Greek king could, for instance, send a message to his prime minister, but instead of saying “Kill the commander”, he could move each letter of the message one forward in the alphabet. So the encrypted message would read as follows: “Ljmm uif dpnnboefs”. Sounds pretty much like nonsense, doesn’t it? But it does the job, doesn’t it?Read More
Ever since the NSA Prism activities have been brought to our attention, the the need for keeping our data private by encrypting it has become more relevant than ever. Ironically enough, a recent statement by RSA, an Internet security firm, revealed that one algorithm its products use, might contain an NSA backdoor. You can read the related BBC article here.Read More
The recent document leak by former National Security Agency (NSA) contractor Edward Snowden did not only shed a different light on our favorite and trusted Internet giants, but also made us realize how fragile and illusory our concept of freedom is. The leak alleges nothing less than frontrunner Internet firms, like Google, Yahoo, Facebook, Skype, were allowing the NSA and the FBI to access their servers, that is, to check the personal files of a vast number of users around the globe. This Washington Post article gives you further details on the subject.
Even though we have always suspected and feared that the Big Brother has been watching us, to be confronted with this fact so harshly feels more than alarming. Do the recent news mean that we no longer have the basic Internet privacy protection rights?Read More
The recent and unfortunate case of Amazon S3 data exposure drew our attention, once again, to some of the potential risks of data handling even cloud storage can not prevent. An analysis conducted by Rapid7 revealed that a misconfiguration issue left nearly 2000 S3 buckets exposed. Including potentially sensitive data.
We can see from that example that accidents can happen even when companies like Amazon look after your data. This is not to say you should quit using cloud services. They usually do provide a great and highly secure way for data storage and handling. But there are some extra measures you could, and should take to protect your data stored in the cloud.Read More
As you already know, we offer two of our products – east-tec InvisibleSecrets (a file encryption software) and east-tec SafeBit (a disk encryption software) as a special priced bundle, called the Encryption Pack. Many have asked us why they need two encryption programs, and how are they different.
InvisibleSecrets is a file encryption / steganography program, and a security suite. Since it covers the stand-alone file encryption it is best used for file transmissions (if you want to securely send files to someone). It has many tools for this purpose:Read More