Forum Replies Created
-
AuthorPosts
-
September 21, 2018 at 10:45 am in reply to: What is the difference between HIDS and NIDS? #11890




(0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...An Intrusion Detection System (IDS) is a device or software application that monitors a network or devices for suspicious activities and helps to detect intrusions. Typically, an IDS is connected to Security Information and Event Management (SIEM) system, which collects outputs from various security systems and filters out malicious activities from false alarms and report them.
This IDS can be network based or host based. A Host Based Network Intrusion Detection System (HIDS) runs on a particular device on a network. It can monitor inbound and outbound traffic of the particular system as well as any suspicious system activity like any suspicious change in system files. Usually HIDS compares any change in system activity with a previously taken snapshot of the uninfected system to detect suspicious activities in the system. As a result, if malware infects the system stealthily and tries to change any system file of the device, HIDS can detect it and warn the user.
A Network based Intrusion Detection System (NIDS) on the other hand is installed on a strategic point on a network, so that it can monitor inbound and outbound traffic of all the devices of the network. It then analyses the traffic based on a library of known attacks and raises an alert if any suspicious activity is detected.
This NIDS again can be of two types โ online NIDS and offline NIDS. As NIDS monitors all inbound and outbound traffic of a network, it can cause a bottleneck and impacts the performance of the network. An online NIDS runs in real time and quickly monitors the Ethernet packets, applies some rules and detects whether the activity is suspicious or not. An offline NIDS, on the other hand, processes the stored data and analyses them to find out whether it is an attack.
To give some quick examples, Snort is a NIDS, where OSSEC is an HIDS. Both are Open Source software.
Related links:
September 21, 2018 at 6:49 am in reply to: What should I do if my personal information is compromised in a data breach? #11885



(0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...It depends on what kind of information is compromised. If you are a victim of a data breach, you should take the following steps to prevent attackers from exploiting the stolen information to make more attacks.
If Financial Information is compromised
If your financial information is compromised, attackers can no doubt exploit that to cause more financial loss. You should immediately take the following steps:
1. If credit card number is compromised, please call up the bank and cancel the card.
2. If bank account number is compromised, please call the bank and request to close the account and open a new one.
3. Monitor all your financial accounts for suspicious transactions.
4. You can also sign up for credit monitoring service and monitor your credit report. This is also a good step to prevent financial losses in case of identity theft.
If your identity information is compromised
This is even more serious, as the attackers can exploit your identity information in many ways. If sensitive information like SSN is compromised, attackers can use that to open credit in your name, illegally rent apartment, get medical treatment in your name, file fake tax returns etc. You should take the following steps to prevent it:
1. Sign up for a credit monitoring service and monitor your credit report.
2. Sign up for a good identity theft protection service. It can be costly, but it saves you from closely monitoring everything yourself.
3. Enable fraud alert for your credit card file, so that if attackers use your identity information to get a new credit card in your name, the lender will see the alert and contact you for verification.
If login credentials are compromised
If your login credentials for any account is compromised, you should take the following steps:
1. Change password for the account. Please note that the length of a password should be at least 12 and it should contain a good combination of small letters, capital letters, numbers and special characters. And, one should never reuse passwords to other accounts.
2. You should login to the account and check carefully whether there is any change in the account settings.
3. Enable 2 FA for the account if possible. This can improve the security of the account up to a great extent. If your account has 2 FA enabled, then an attacker wonโt be able to get access of your account, even if the attacker has your email address and password.
4. If you have any security question associated with the account, please change that. I would also suggest, if you use the same security question to other accounts, please change there too.
5. Repeat the process for all other accounts where you think you have used the same login credentials. This is important, as attackers often use the stolen credentials to hack more accounts where the victim has reused the credentials.
6. Report the hack. You can report it to the service provider or the legal authorities if needed.
7. Contact credit agencies and monitor your credit report. Attackers often exploit the information present in a hacked account to perpetrate phishing scam or other attacks and cause financial losses. So, it is always better to be on safer side.
In fact, in all the above cases, it is always better to be stay alerted for phishing attacks. Hope this helps.
Related thread: https://www.thesecuritybuddy.com/discussion-room/topic/what-should-i-do-if-my-email-account-is-hacked/
September 19, 2018 at 6:37 pm in reply to: Is UC Browser safe to use? #11836



(0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...UC browser is developed by UCWeb, which in turn is owned by Alibaba Group. UC browser is a popular browser because of its speed and low data usage. So, many people use it in smart phone. But, my opinion would be, it is not safe to use.
Here is why:
1. It is proved many times that this browser sends various data about its users to a server located in China. Data include websites a user visited, search terms, personal details, bookmarks, images and videos the user watched etc. This is definitely a privacy concern.
2. Not only browsing data, the browser also leaks sensitive data like Android ID, MAC address, IMEI number, MSISDN data etc. This is no doubt a security concern.
3. The browser also leaks Geolocation and Wi-Fi related data, which can be used by intelligence agencies to track users.
4. Security researchers have also found several major security vulnerabilities, such as Logjam, FREAK, POODLE etc. in the browser. And, this poses a serious security concern.
5. Moreover, many anti-malware programs often flag UC browser as trojan, adware and malware.
6. And, users often complain that the browser forces users to download UC News Promotion, Lockers, battery optimizer and cleaner apps and ad-blockers do not work properly in the browser.
So, my opinion would be it is better not to use this browser.
September 19, 2018 at 3:14 pm in reply to: How to test a suspicious link without clicking it? #11833



(0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...There are several options for doing that:
1. There are many services available which can expand a shortened URL for you. Checkshorturl.com, https://www.expandurl.net, https://urlex.org/ are to name a few. You can provide the shortened URL as input and it will show the expanded URL.
2. You can use a good anti-malware program to scan a link before opening it. . Norton SafeWeb, URLVoid, ScanURL are to name a few.
3. However, it is always good to enable real-time protection in your anti-malware programs. Even if you click on a bad link accidentally, the anti-malware program should be able to warn you for that.
4. And, last but not the least, please keep your anti-malware programs updated. Also, please update your Operating System, browser and other commonly used software with recent security patches. Attackers most of the time exploit security vulnerabilities present in a commonly used software to infect a system. And, more updated a software is, lesser are its known security vulnerabilities.
September 19, 2018 at 11:55 am in reply to: Can VPN protect us from DDoS attack ? #11830



(0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...If you use a VPN, then any request to any host over the internet first goes to the VPN server. The VPN server replaces the source IP address of the request with its own IP address and then the request reaches the requested host. As a result, the requested host can only see the IP address of the VPN server. Again, when the host sends a reply, the reply first goes to the VPN server, which replaces the destination IP address with your IP address and forwards the response to your system. As a result, if you access the internet from your system, your IP address does not get revealed. You would get more information on how VPN works here : https://www.thesecuritybuddy.com/vpn/how-do-nat-and-vpn-work/
So, if an attacker targets any DDoS attack to the IP address that the attacker gets from any request from your system, it will reach the VPN server first and the VPN server will be able to prevent it. And your system as well as home network will be safe. Thus, using VPN is a good preventive measure against DDoS attacks. In fact, it is always better to use VPN especially if you are using gaming etc.
September 19, 2018 at 11:36 am in reply to: How to prevent DDoS attack on PS4 ? #11827



(0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...You can take the following steps to mitigate the attack:
1. Reset your internet router โ If you reset your router, your router most likely will get a new IP address and that can stop the attackers at least for some time. You can also go to your router settings page and assign a new IP address to the router.
2. Contact your ISP โ If you are unable to assign a new IP address to the router and unable to prevent the attack, you can contact your Internet Service Provider for help. They may be able to assign a new IP address to your router and help you to prevent the DDoS attack. For example, your ISP can help you in identifying the source of the attack.
3. Report the attacker โ If you can identify the attacker and his ISP, you can report it to his ISP. You can also report about the attack to playstation support. You would get more information about how to report or block an abusive user here https://support.us.playstation.com/articles/en_US/KC_Article/Report-Inappropriate-or-Abusive-Users/
And, prevention is always better than cure. It is always better to use VPN while gaming. This will prevent your IP address to get revealed to the attacker. You would get more information on preventing DDoS attack in this thread: https://www.thesecuritybuddy.com/discussion-room/topic/how-to-prevent-ddos-attack-on-router/
September 19, 2018 at 11:13 am in reply to: How to prevent DDoS attack on Xbox ? #11824



(0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...You can take the following steps to mitigate the attack:
1. Reset your internet router โ If you reset your router, your router most likely will get a new IP address and that can stop the attackers at least for some time. You can also go to your router settings page and assign a new IP address to the router.
2. Contact your ISP โ If you are unable to assign a new IP address to the router and unable to prevent the attack, you can contact your Internet Service Provider for help. They may be able to assign a new IP address to your router and help you to prevent the DDoS attack. For example, your ISP can help you in identifying the source of the attack.
3. Report the attacker โ If you can identify the attacker and his ISP, you can report it to his ISP. You can also report about the attack to Xbox Live. You can use the complaint form and select the โtamperingโ category.
And, prevention is always better than cure. It is always better to use VPN while gaming. This will prevent your IP address to get revealed to the attacker. You would get more information on preventing DDoS attack in this thread: https://www.thesecuritybuddy.com/discussion-room/topic/how-to-prevent-ddos-attack-on-router/
September 19, 2018 at 9:52 am in reply to: How to prevent DDoS attack on router? #11820



(0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...If we take the following steps, it can give us basic protection against DDoS attacks on our home router:
1. Enable firewall on router โ Almost all routers provide the option of enabling firewall. The firewall may not be very advanced one, but it is good enough to give us a basic protection against DDoS attack. Please go to your router settings page and enable firewall and DDoS protection following the instruction manual of your router.
2. Use trusted anti-malware programs on all your devices โ Anti-malware programs may not prevent DDoS attack directly, but indirectly it helps a lot. It can protect your devices from various malware and can prevent your computer to be part of any botnet.
3. Configure proper firewalls on all your devices โ No device should be connected to the Internet without using proper firewall. Please make sure you close vulnerable ports, restrict unnecessary applications from using the Internet and restrict your devices within the home network from communicating with each other unnecessarily. This is important as it can also prevent any malware from infecting other devices on your network in case the malware manages to infect one of your devices.
4. Use a VPN โ VPN can hide your IP address from attackers. Attackers can only see the IP address of your VPN server. As a result, even if they make any DDoS attack, your VPN server will protect your devices from the attack.
5. Update your software and firmware โ Please update your router firmware regularly. Also, keep your Operating System, browser and commonly used software updated with recent security patches. More updated a software or firmware is, lesser are its known security vulnerabilities.
6. Use official servers for online gaming โ Please use official servers like PlayStation Network or XBOX Live for online gaming. Using third party servers can reveal your IP address to the third-party server or to the public.
7. Use your common sense while using the social networking site โ Please think twice before sharing anything over the social networking site. Also, please use your common sense before clicking on any link or visiting any website.
8. Change IP address for your router โ If your ISP allows you, then you can go to router settings and change IP address for your router.
9. Contact your ISP โ If you are experiencing DDoS attack and unable to prevent it or unable to change the IP address of the router, you can contact your Internet Service Provider for help.
September 18, 2018 at 7:04 pm in reply to: How does an email account get hacked ? #11817



(0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...An email account can be hacked by attackers in several ways. Letโs talk about the most common methods :
1. You were victim of a phishing scam. You may have been deceived to click on a link which took you to a authentic looking fraudulent website and the website collected login information from you by trickery. It may even happened that you mistyped the URL of an authentic website and a similar looking fraudulent website opened where you provided your login credentials. In fact, there are several ways users can fall victim of phishing scams. You can find more information here : https://www.thesecuritybuddy.com/phishing/how-to-prevent-social-engineering-attacks/ and https://www.thesecuritybuddy.com/email-security/how-to-prevent-phishing/
2. You used a shared device and forgot to log out. The authentication cookies was stored in the device, which the attackers exploited. In fact, it is always recommended that you open browser in private or incognito mode when you are logging in an account from a device that is not yours.
3. You logged in your email account from a device that was infected by malware. There are several types of malware that can steal your password or your authentication cookies from the device. It can be a trojan, a rootkit or a keylogger. That is why it is always recommended to scan your device regularly with trusted anti-malware programs and update the anti-malware programs regularly.
4. You used a weak and easy to guess password. A password should be at least 12 characters long and should contain a combination of small letters, capital letters, numbers and special characters. Also, one should not reuse the same password for other accounts and one should not include any personal favorite word in the password. Also, please enable 2 FA if your email service provider gives that option. An email account that has 2 FA enabled is much more secure than an account that hasnโt.
5. You reused your password and the other account where you used the password got compromised by some attack or due to any recent data breaches. Attackers often share stolen data among themselves and whenever there are any data breaches, they try to reuse the data for even more attacks. So, never reuse your password for multiple accounts.
6. You used unsecured wireless network. Very often users fall victim of Evil Twin (What is Evil Twin ?) As a result, all the data that we transfer without using proper encryption get compromised. That is why it is always advisable to use VPN while accessing a public Wi-Fi.
7. Your system got infected by malware. As said earlier, attackers can infect a system with malware like keylogger, rootkit or trojan and harvest account passwords of victims. So, it is always advisable to use trusted anti-malware programs in a system and update them regularly. Also, please update your Operating System, browser and other commonly used software with recent patches. Always remember, more updated a software is, lesser are its known security vulnerabilities.
So, there can be multiple reasons why an email account or any online web account got hacked. As discussed in this thread https://www.thesecuritybuddy.com/discussion-room/topic/what-should-i-do-if-my-email-account-is-hacked/ follow some simple steps to mitigate the attack and take proper preventive measures to make sure it does not happen again.
September 18, 2018 at 12:45 pm in reply to: What should I do if my email account is hacked ? #11814



(0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...If your email account is hacked, please donโt panic ! You can always take a couple of steps to mitigate the problems.
1. Run anti-malware programs โ This should be the very first step. Scan your computer with some good anti-malware programs and make sure all malware are removed properly from the system, in case there were any. This is important because if there are malware present in the system, then even if the email password and account settings are changed, hackers may be able to gain the access to the account back.
2. Change password โ The very next step should be to change the password of the email account. Please note that the length of a password should be at least 12 and it should contain a good combination of small letters, capital letters, numbers and special characters. And, one should never reuse passwords to other accounts.
If an attacker manages to get password of an account, probably the very next thing he would do is to try the same password to other accounts of the user. If you feel remembering strong and different passwords to multiple accounts is difficult, please use a good password manager. You can find more information on some good password managers available on the market here : https://www.thesecuritybuddy.com/best-password-manager/
3. Check your account settings โ Now, you should login to the account and check carefully whether there is any change in the account settings. Many a times attackers change account settings of a hacked account, for example to forward sensitive emails to the attacker.
4. Notify all your contacts โ This step is important. Many a times attackers exploit a hacked account to send emails to the contacts of the hacked account for the purpose of phishing or spreading malware. A user is much likely to open an email and click on the link or open an attachment if the email comes from a known person. Please request your contacts not to click on any link or open attachment of any suspicious looking email sent from your email address.
5. Enable 2 Factor Authentication โ Nowadays most of the email service providers provide the option of enabling 2 FA. This can improve the security of an account up to a great extent. If your account has 2 FA enabled, then an attacker wonโt be able to get access of your account, even if the attacker has your email address and password.
6. Change your security question if any โ If you have any security question associated with the account, please change that. I would also suggest, if you use the same security question to other accounts, please change there too.
7. Repeat the process for all other accounts where you use the same email address or password โ This may look redundant, but it is important. Suppose you use the same email address for a different account and the password used was not strong enough for the attackers, or suppose you used the same password to another account and the username or email address used was easy enough for attackers to guess. Nowadays we reveal much more information on social networking sites than we think we do.
8. Report the hack โ It is better to report your email provider about the hacking. The email provider may even help you with the origin or the nature of the attack.
9. Contact credit agencies โ Attackers often exploit the hacked information to commit even more cyber crime. They may also use this information for phishing scams and make purchases on your credit card. So, it is better to ask credit reporting agencies to monitor your accounts for some months when you were hacked.
10. Look for suspicious emails in the hacked account – If your email service provider is unable to detect spams and phishing emails in the hacked account after the attack, you can think of closing the account and make necessary changes to other accounts where you use the same email address.
Hope this helps.
August 12, 2018 at 7:07 pm in reply to: Is this an extortion email based on password theft ? #11612



(0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...First of all, it is always good to scan your systems with reputable anti-malware programs. Anti-malware programs may not be perfect, but good and reputable ones should be able to detect the kind of malware as described in the email. Also, have a look at your data uploads and downloads from your network. Are there any significant changes there ? If someone is hacking webcam and transferring the data back to their server, there should be significant changes in network usage.
There were quite a number of data breaches in the past, linkedin and yahoo breaches are to mention a few of them. Attackers often share hacked data and once they get email address and password of one user from a data breach, they try to use them for phishing purpose, as many users reuse old passwords or do not change passwords often. Often criminals hack a website and get email address and passwords of users of that website. But, if those user account do not contain enough sensitive data, the criminals try to make money by using those email addresses and passwords to extort money from those users by sending out emails like this.
This particular email is a phishing scam. Attackers typically try to extort money from users by sending this scary email.
However, if a user gets any email of similar kind, here is what he/she should do :
– Scan your systems thoroughly with good and reputable anti-malware programs.
– Look at your network usage. Are there any significant changes recently ?
– Is the password mentioned in the email an old password that you often reuse ? Anyways, it is always good to change old passwords and not to reuse the same password in multiple websites.
– Configure firewalls in your system. It is always good to give permission to use internet only to limited applications. And, close all unused ports.
– Think twice before sharing anything in social networking websites.
– It is always a good practice to browse websites from a Virtual Machine. If you suspect malware, simple go back to a previously saved image of the Virtual Machine and destroy the current one.
– If you are visiting unknown website, you can think of using script blockers.
– Enable 2 Factor Authentication wherever it is possible. (What is 2 Factor Authentication and why should we always enable it ?)
Hope the answer helps.
Related articles :
What is a Remote Access Trojan ?
What is a Creepware ?
How to prevent keyloggers ?June 1, 2018 at 8:44 am in reply to: Does VPN make you anonymous ? #11541



(0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...Letโs first understand how VPN works. A user usually installs a VPN client in his computer and connects to the VPN server using the VPN client. This creates a tunnel through which data is transferred in an encrypted format.
So, after a VPN connection is established, when the VPN user accesses a website or transfers any data, the data is first encrypted and transferred to the VPN server through the tunnel and then the VPN server makes a connection to the actual destination.
This has the following advantages :
1. As the data is transferred from your computer in an encrypted format, no one can decrypt and read the data.
2. The destination website will see the IP of the VPN server, instead of that of the user.
Now, the question is, does VPN make you anonymous then ?
The answer is โ No. VPN cannot make you anonymous for the following reasons :
1. Even though the destination website cannot see your IP address, the VPN service provider can. In fact, every VPN service provider logs at least some amount of data of the users to enable their service. For example, if the VPN service provider does not log any data of the users, it wonโt be able to offer plans based on GB usage of users or limit VPN connections per user. Moreover, to make sure their service is not abused or to prevent spams or DDoS attacks, VPN service providers always need to log some amount of data of the users.
2. Even if the VPN service provider does not log any private details of the users, the less sensitive data the service provider stores can always be associated with other data to reveal enough information about the user.
In fact, no Internet service, including Tor and Bitcoin can truly make you anonymous in that regard.
So, now the question is, why should we use VPN then ?
VPN is good for a user for a number of reasons.
When any data is transferred from your computer using a VPN connection, it is done in an encrypted format. So, if you are using a public Internet, such as public Wi-Fi in a restaurant, mall or hotel and you must login to a website or transfer some data, then you must use VPN for security purpose. If you use VPN, no one evil can decrypt and read easily which website you are browsing or what data you are transferring. To get a better understanding of this point, you can refer this article โ What is an Evil Twin Attack and how should we prevent it ?
In fact, VPN can secure you from many malicious attempts to steal your sensitive data transferred over the Internet.So, VPN cannot make you truly anonymous, but from a security perspective, it is always good to use a VPN.
February 26, 2018 at 3:13 pm in reply to: Why is GPG hanging when generating key ? #7221



(0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...When generating a GPG keypair, we often get this message :
We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.Not enough random bytes available. Please do some other work to give
the OS a chance to collect more entropy! (Need 142 more bytes)In Information Theory, there is a term called entropy. An entropy is a measure of unpredictability of information content in a message. Randomness is a measure of uncertainty in an outcome and thus is applied to the concept of information entropy.
Now, GPG relies heavily on randomly generated keys. We randomly generate a secret key and encrypt secret data using that key. So, in other words, more random a secret key is, more secure the encryption will be.
But, how should these random bytes be generated ? In fact, there are a number of methods to do that. Keyboard, mouse movements, disk or other hardware are often used to generate these random bytes. A more detailed information on entropy, randomness and how random bytes are generated can be found here : What is entropy in cryptography ?
So, in other words, GPG generates random secret key and to do that it needs lots of random bytes. It collects those random bytes from keyboard, mouse, disks etc. More busy these devices are, more random byes will be generated and generating GPG key will take lesser time.
So, if your program hangs when generating a GPG key, try to make your system more busy. You can move your mouse, type on keyboard or run some program that takes lots of resources. That would help.
February 26, 2018 at 1:21 pm in reply to: What is BitLocker ? #7202



(0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...BitLocker is a Full Disk Encryption program included with Windows. Using BitLocker one can encrypt contents of the whole disk using a secret key. (What is Full Disk Encryption ?)
BitLocker may use three mechanisms for encryption and decryption of the disk :
(1) Transparent operation mode – It can use TPM or Trusted Platform Module hardware to provide transparent encryption and decryption. In this method, the secret key used in encryption is encrypted by the TPM chip. A user powers on the Windows machine as usual. But, during the boot, if boot files appear to be unmodified then the TPM chip releases the secret key to the OS loader code.
(2) User authentication mode โ In this mode, the user needs to provide some authentication to the pre-boot environment. He may need to provide a PIN or password for that purpose.
(3) USB key mode โ In this mode, the user needs to insert a USB drive that contains the startup key that is required to boot the OS. Please note that in this mode BIOS needs to be able to read a USB drive in the pre-OS environment.
Encrypting File System may be used along with BitLocker to protect the operating system once it is running. You can find more information on Encrypting File System here: What is Encrypting File System and how does it work ?
You may find the following links useful for further information :
1. Windows BitLocker Drive Encryption Step-by-Step Guide
2. What is a TPM, and Why Does Windows Need One For Disk Encryption?
3. How to turn the TPM on or off
4. How to Use the TPM: A Guide to Hardware-Based Endpoint Security- This reply was modified 8 years ago by tupu.
- This reply was modified 8 years ago by tupu.
- This reply was modified 8 years ago by tupu.
- This reply was modified 5 years, 7 months ago by tsb-moderator.
February 26, 2018 at 1:20 pm in reply to: What is end-to-end encryption ? #7198



(0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this.
Loading...End-to-end encryption is an encryption technology where only the communicating members are able to decrypt and read an encrypted message. It prevents potential eavesdroppers from reading the message, not even telecom provider, Internet provider, provider of the communication service or any other third party.
So, in other words, if Alice sends an encrypted message to Bob using end-to-end encryption, only Alice and Bob will be able to decrypt and read the message and no one else. Internet Service Provider or telecom provider of Alice or Bob cannot decrypt the message. Moreover, if Alice and Bob use any communication service like Whatsapp to send the encrypted message using end-to-end encryption, the communication service provider also wonโt be able to read the message.
End-to-end encryption is developed to defeat any attempts of surveillance or tampering by any third parties. This encryption technology is widely used in PGP ( What is PGP ? ), GnuPG (How are PGP, OpenPGP and GnuPG different from each other ?), Protonmail, S/MIME (How are S/MIME and PGP different from each other in encrypting emails ?), Mailfence etc for email. FaceTime or ZRTP use this for telephony. Even Instant Messaging service like Whatsapp also use this technology.
-
AuthorPosts




















