I know, encryption is a word that sounds like Superman is talking to Ironman in the 22nd century on a faraway planet. But in fact, encryption has been used as a security measure since ancient times, first by the Egyptians, the Israelites and the Mayans, then the Greeks and the Romans. It is the technique of turning plain text into unintelligible text so that its original meaning becomes hard or impossible to figure out unless one knows what way it was altered. A Greek king could, for instance, send a message to his prime minister, but instead of saying “Kill the commander”, he could move each letter of the message one forward in the alphabet. So the encrypted message would read as follows: “Ljmm uif dpnnboefs”. Sounds pretty much like nonsense, doesn’t it? But it does the job, doesn’t it?Read More
Ever since the NSA Prism activities have been brought to our attention, the the need for keeping our data private by encrypting it has become more relevant than ever. Ironically enough, a recent statement by RSA, an Internet security firm, revealed that one algorithm its products use, might contain an NSA backdoor. You can read the related BBC article here.Read More
The recent document leak by former National Security Agency (NSA) contractor Edward Snowden did not only shed a different light on our favorite and trusted Internet giants, but also made us realize how fragile and illusory our concept of freedom is. The leak alleges nothing less than frontrunner Internet firms, like Google, Yahoo, Facebook, Skype, were allowing the NSA and the FBI to access their servers, that is, to check the personal files of a vast number of users around the globe. This Washington Post article gives you further details on the subject.
Even though we have always suspected and feared that the Big Brother has been watching us, to be confronted with this fact so harshly feels more than alarming. Do the recent news mean that we no longer have the basic Internet privacy protection rights?Read More
Today we’re pleased to offer you two new members of our security family: east-tec InvisibleSecrets and east-tec SafeBit. We have been creating privacy and security products and solutions for the last 15 years, since the end of 1997. Today we are expanding our product line with two encryption and steganography products, designed to prevent unwanted people from reading your private documents and files.
East-Tec has acquired these two top class security products from Neobyte Solutions, which has been developing and improving them since 1999. Eugen Malita, our CEO, explains:
“We’re happy to provide our customers with top-class encryption and steganography software. We have received a lot of requests from them, so we hope we are making their wishes come true!”
Working with personal data on a computer means your privacy and identity need to be protected. Here are a few basic tips that will help you stay out of trouble.
1. Password protect all your Windows accounts
Passwords provide the first layer of protection against hackers or if you are to share a computer with others.The list of DOs and DON’Ts below guarantees enhanced protection. Keep them in mind when creating and using passwords:Read More