The Encryption Series Part 1: What Is Encryption And Why You Need To Use An Encryption Software

The Encryption Series Part 1: What Is Encryption And Why Do You Need To Use An Encryption Software?

I know, encryption is a word that sounds like Superman is talking to Ironman in the 22nd century on a faraway planet. But in fact, encryption has been used as a security measure since ancient times, first by the Egyptians, the Israelites and the Mayans, then the Greeks and the Romans. It is the technique of turning plain text into unintelligible text so that its original meaning becomes hard or impossible to figure out unless one knows what way it was altered. A Greek king could, for instance, send a message to his prime minister, but instead of saying “Kill the commander”, he could move each letter of the message one forward in the alphabet. So the encrypted message would read as follows: “Ljmm uif dpnnboefs”. Sounds pretty much like nonsense, doesn’t it? But it does the job, doesn’t it?

Read More

NSA-linked RSA Algorithm Is Not Used In Our Encryption Software Products

NSA-linked RSA Algorithm Is Not Used In Our Encryption Software Products

Ever since the NSA Prism activities have been brought to our attention, the the need for keeping our data private by encrypting it has become more relevant than ever. Ironically enough, a recent statement by RSA, an Internet security firm, revealed that one algorithm its products use, might contain an NSA backdoor. You can read the related  BBC article here.

Read More

How To Protect Your Internet Privacy In The Face Of The NSA Prism Spying Scandal

How To Protect Your Internet Privacy In The Face Of The NSA Prism Spying Scandal

The recent document leak by former National Security Agency (NSA) contractor Edward Snowden did not only shed a different light on our favorite and trusted Internet giants, but also made us realize how fragile and illusory our concept of freedom is. The leak alleges nothing less than frontrunner Internet firms, like Google, Yahoo, Facebook, Skype, were allowing the NSA and the FBI to access their servers, that is, to check the personal files of a vast number of users around the globe. This Washington Post article gives you further details on the subject.

Even though we have always suspected and feared that the Big Brother has been watching us, to be confronted with this fact so harshly feels more than alarming. Do the recent news mean that we no longer have the basic Internet privacy protection rights?

Read More

The East-Tec Security Family Has Two New Members: InvisibleSecrets and SafeBit

The East-Tec Security Family Has Two New Members: InvisibleSecrets and SafeBit

Today we’re pleased to offer you two new members of our security family: east-tec InvisibleSecrets and east-tec SafeBit. We have been creating privacy and security products and solutions for the last 15 years, since the end of 1997. Today we are expanding our product line with two encryption and steganography products, designed to prevent unwanted people from reading your private documents and files.

East-Tec has acquired these two top class security products from Neobyte Solutions, which has been developing and improving them since 1999. Eugen Malita, our CEO, explains: “We’re happy to provide our customers with top-class encryption and steganography software. We have received a lot of requests from them, so we hope we are making their wishes come true!”

Read More

10 Ways To Protect Your Privacy And Identity On A Windows Computer

10 Ways To Protect Your Privacy And Identity On A Windows Computer

Working with personal data on a computer means your privacy and identity need to be protected. Here are a few basic tips that will help you stay out of trouble.

1. Password protect all your Windows accounts

Passwords provide the first layer of protection against hackers or if you are to share a computer with others.The list of DOs and DON’Ts below guarantees enhanced protection. Keep them in mind when creating and using passwords:

Read More