The Encryption Series Part 1: What Is Encryption And Why You Need To Use An Encryption Software

The Encryption Series Part 1: What Is Encryption And Why Do You Need To Use An Encryption Software?

I know, encryption is a word that sounds like Superman is talking to Ironman in the 22nd century on a faraway planet. But in fact, encryption has been used as a security measure since ancient times, first by the Egyptians, the Israelites and the Mayans, then the Greeks and the Romans. It is the technique of turning plain text into unintelligible text so that its original meaning becomes hard or impossible to figure out unless one knows what way it was altered. A Greek king could, for instance, send a message to his prime minister, but instead of saying “Kill the commander”, he could move each letter of the message one forward in the alphabet. So the encrypted message would read as follows: “Ljmm uif dpnnboefs”. Sounds pretty much like nonsense, doesn’t it? But it does the job, doesn’t it?

Read More

NSA-linked RSA Algorithm Is Not Used In Our Encryption Software Products

NSA-linked RSA Algorithm Is Not Used In Our Encryption Software Products

Ever since the NSA Prism activities have been brought to our attention, the the need for keeping our data private by encrypting it has become more relevant than ever. Ironically enough, a recent statement by RSA, an Internet security firm, revealed that one algorithm its products use, might contain an NSA backdoor. You can read the related  BBC article here.

Read More

How To Protect Your Internet Privacy In The Face Of The NSA Prism Spying Scandal

How To Protect Your Internet Privacy In The Face Of The NSA Prism Spying Scandal

The recent document leak by former National Security Agency (NSA) contractor Edward Snowden did not only shed a different light on our favorite and trusted Internet giants, but also made us realize how fragile and illusory our concept of freedom is. The leak alleges nothing less than frontrunner Internet firms, like Google, Yahoo, Facebook, Skype, were allowing the NSA and the FBI to access their servers, that is, to check the personal files of a vast number of users around the globe. This Washington Post article gives you further details on the subject.

Even though we have always suspected and feared that the Big Brother has been watching us, to be confronted with this fact so harshly feels more than alarming. Do the recent news mean that we no longer have the basic Internet privacy protection rights?

Read More

Get Your Head Out Of The Clouds And Use Encryption To Look After Your Data

Get your head out of the clouds and use encryption to look after your data

The recent and unfortunate case of Amazon S3 data exposure drew our attention, once again, to some of the potential risks of data handling even cloud storage can not prevent. An analysis conducted by Rapid7 revealed that a misconfiguration issue left nearly 2000 S3 buckets exposed. Including potentially sensitive data.

We can see from that example that accidents can happen even when companies like Amazon look after your data. This is not to say you should quit using cloud services. They usually do provide a great and highly secure way for data storage and handling. But there are some extra measures you could, and should take to protect your data stored in the cloud.

Read More

File Encryption And Disk Encryption For Maximum Security

File Encryption And Disk Encryption For Maximum Security

As you already know, we offer two of our products – east-tec InvisibleSecrets (a file encryption software) and east-tec SafeBit (a disk encryption software) as a special priced bundle, called the Encryption Pack. Many have asked us why they need two encryption programs, and how are they different.

InvisibleSecrets is a file encryption / steganography program, and a security suite. Since it covers the stand-alone file encryption it is best used for file transmissions (if you want to securely send files to someone). It has many tools for this purpose:

Read More