18 Aug 2016

Shadow Brokers Release NSA Hacking Tools to the Public

A hacking group called Shadow Brokers has reportedly stolen powerful hacking tools from the Equation Group, a hacking group believed to be NSA-backed and responsible for many of the largest state-level hacks in history. On Saturday, Shadow Brokers released a subset of these tools to the public, which several former employees of the NSA’s hacking division, known as Tailored Access Operations (TAO), have said appear to be legitimate NSA files. Shadow... Read more...

03 Aug 2016

Russian Hackers and Pig Latin

With the recent media focus on cybersecurity, whether it is talk of Russian hackers scheming to influence US presidential elections or “Brexit” votes, or the pervasive pressure to comply with HIPAA (healthcare privacy regulations) or other consumer data privacy requirements, “encryption” is one of the solutions that is often introduced. When sending email, email encryption can indeed protect your strategic dialog from potential exposure, and... Read more...

03 Jan 2014

Conflicting Federal Court Rulings on NSA Phone Surveillance Ignite Debate – What to do in the Meantime?

Don’t dial that friend in Yemen just yet. On a judicial hot seat the last couple of weeks, the NSA’s maligned mass phone surveillance programs apparently have found both esteemed supporters and opponents in the country’s federal district courts. In the past three weeks, we’ve seen two opposite rulings from US federal district courts on the constitutionality of the NSA’s mass phone surveillance programs, setting the stage for what may eventually... Read more...

14 Aug 2013

How RPost Encryption is Secure and Different from Lavabit and Silent Circle, in Light of NSA Whisleblower Revelations

On Thursday, August 8th, rather than allegedly allowing the U.S. government access to their users’ messages, two secure email services, Lavabit and Silent Circle’s Silent Mail, suddenly and voluntarily closed their doors. The publicity surrounding the shutdowns have once again led to questions about “how RPost encryption is different?” Store and forward systems, those systems that store messages and forward them as links, copies, or access... Read more...

01 Jul 2013

Independence Day: The Revolution for Digital Privacy Begins Now

This time of year, we usually find ourselves reflecting on the great freedoms we enjoy as Americans, thanks to the bravery of our founding fathers. Recent alleged revelations made public by NSA whistleblower Edward Snowden foreshadow a rising threat to the Constitution which was put in place to protect these freedoms, including 4th Amendment protection from unreasonable searches. Technology can be used by some to search and seize your digital identity... Read more...