Post Profile






The Ultimate Wearable: A Second Skin That Feels What You Can't

Summary: We’re surrounded by intangible information. Every second of the day, radio waves resonate encrypted messages through our walls, furniture, and skulls. And to translate this omnipresent flood, we pick up our phones or open our laptops, pressing endless buttons while staring into screens. It’s one of the great problems...
read more

share

Related Posts


Two Tips to Keep Your Phone’s Encrypted Messages Encrypted

Technology / Security : Wired: Security

WhatsApp and Viber may have turned on "default" end-to-end encryption, but truly securing your messages requires a couple steps of your own. The post Two Tips to Keep Your Phone's Encrypted Messages Encrypted appeared first on WIRED...

Viber adds end-to-end encryption and hidden chats as messaging app privacy wave grows

Technology / Social Media : TechCrunch: Social

Following WhatsApp’s move to add end-to-end encryption to its platform, another big messaging company is joining the wave of apps turning on expanded privacy features. Viber — a messaging app with 711 million+ users — today is intro...

Your Facebook Pokes Are Stored For Two Days, Then Their Encryption Keys Are Deleted

Technology : TechCrunch: Enterprise

Facebook Poke messages self-destruct after a few seconds. but is Facebook saving these potentially embarrassing photos and videos? No. It's deleting them. Pokes are encrypted, and Facebook deletes the encryption keys two days after ...

Billions of waves: The evolution of wireless communication in 3 charts

Technology : Pando Daily

When people think of radio waves they think of, well, the radio; AM and FM tuners of days gone by. But in fact there are more radio waves floating through the air than ever before. The signals created by cell phones, television broa...

Even My Mum Can Use This Encryption Service (I Know Because I Made Her Try)

Technology : Vice: Motherboard

Sending an encrypted email, for most people, is hard. Although a wave of secure messaging tools have flooded app stores since Edward Snowden’s NSA revelations, and clear tutorials on how to set up encrypted email have since been pen...

Comments


Copyright © 2016 Regator, LLC