Hey You, Get Off (or On) My Cloud 15 or so years ago, ‘the cloud’ was considered the next big thing in business and personal technology. No longer did each machine you used Needed? have files or applications stored on it locally. When you worked on a document in the office, you now didn’t need […]
Let’s Ring in a New Era of Privacy? The German philosopher, Hegel, wrote (and I’m paraphrasing here) that history is merely a never-ending series of reactions to reactions. Once a thing is done, there is an inevitable reaction to it and then a reaction to that and so on.
RPost’s SecuRmail service employs AES 256-bit encryption to convert select email into a more private encrypted format. The recipient must have an up-to-date PDF reader to view the encrypted message and any attachments received with that message. To view attached files embedded in the encrypted PDF file, one must use Adobe Reader 7.0 (circa 2004) […]
RMail: The N95 Mask of Email Encryption Software Earlier this week, a house party in Beverly Hills, California made national headlines, as hundreds of revelers went maskless and practiced virtually zero social distancing. Worse still was that gunfire erupted later on in the party, and three people were shot. Parties like this are hardly limited […]
Email encryption systems often advertise identical benefits, but there are some critical differences that you should understand before choosing a system. Below we outline three different methods: True Direct Delivery, Secure Store and Forward and Public Key Exchange. The best method for security and ease of use is the “True Direct Delivery” method employed in […]
Foreign Journalists Discover Treasure in Bermuda As enchanting as the Bermuda sea is, during rough weather, Bermuda’s beguiling reefs have been the source of many lost ships over the past hundreds of years during trans-Atlantic journeys shipping treasures and taxes from the Americas to Europe. However, no one could have anticipated the rough waves that […]
Not All TLS is Created Equal Many, many software service sales professionals throw around security phrases to make cyber security sound simple. Today, as technologies advance and threats get ever more sophisticated, encrypting email for privacy compliance is not getting simpler. The devil (hacker) is in the details.
Pig Latin, Russian Spies and Email Encryption With the recent media focus on cybersecurity, whether it is talk of Russian hackers scheming to influence US presidential elections, or the pervasive pressure to comply with GDPR or HIPAA (healthcare privacy regulations) or other consumer data privacy requirements, “encryption” is one of the solutions that is often […]
The Chinese Don’t Need Impeachment Inquiries. They Have A Citizen Score China is becoming the first society to connect all the data from a vast array of digital surveillance technologies, with an aim to seemingly control the population. China’s communist party is developing a “citizen score” to incentivize “good” behavior, harnessing advances in artificial intelligence, […]
With RMail service, the sender can opt to send encrypted messages by Message-Level Encryption, Transport Layer Encryption, or a combination. As such, there are four scenarios for encrypted transmission. In all cases, the encrypted message is delivered direct to the recipient’s desktop; RMail never requires the recipient to visit a website to collect their email.
November 20, 2024
November 12, 2024
November 06, 2024
November 01, 2024
October 29, 2024