Menu

Analysis

Select category

Why We Need Client-Side Encryption?

Anamika Ved and Liz Steininger on September 19, 2017

Already in 2017, there has been an inordinate number of cybersecurity meltdowns. This complex and constantly evolving range of security threats lead many of us to wonder how we can best protect our data from theft or loss. Many cloud providers advertise their use of end-to-end encryption for security. However, some of the important data breaches in the past have demonstrated that end-to-end encryption may not be enough. What is end-to-end encryption? End to end encryption is a method of...

Read more

Privacy and Security by design is a crucial step for privacy protection.

Anamika Ved on July 24, 2017

In just 10 months from now, companies headquartered in an EU country and all organizations that process data on EU residents will have to comply with the requirements of the GDPR - the EU General Data Protection Regulation. GDPR approved by the EU Parliament on 14th April 2016, is designed to harmonize data privacy laws across Europe, to protect and empower all EU citizens’ data privacy and to reshape the way organizations across the region approach data privacy. GDPR, which will take effect...

Read more

Debunking the “Nothing-to-Hide” Rhetoric

Anamika Ved on May 17, 2017

A few months ago, Least Authority ran user-testing sessions to get a sense of what our potential users think about our products - S4, our current Amazon S3 based application of Tahoe-LAFS and Gridsync, our forthcoming graphical user interface for S4 and Tahoe-LAFS. In addition to getting valuable feedback, it was interesting to hear diverse perspectives on the questions of data security, privacy, and surveillance. One of the viewpoints that stuck with us was “I don’t care about privacy. I’ve...

Read more

BLAKE2: “Harder, Better, Faster, Stronger” Than MD5

Zooko Wilcox-O'Hearn on March 21, 2014

Best read while listening to Daft Punk: Harder, Better, Faster, Stronger Why use BLAKE2 instead of Skein, Keccak (SHA-3), MD5, or SHA-1 as a secure hash function? BLAKE was the best-rated hash function in the SHA-3 competition NIST, in the final report of the SHA-3 competition, said this about the finalists (which included BLAKE, Keccak, Skein, and Grøstl): BLAKE had a security margin — the gap between a known-weak reduced version and the full version — comparable to Keccak and superior to...

Read more

Open Letter to Phil Zimmermann and Jon Callas of Silent Circle, On The Closure of the “Silent Mail” Service

Zooko Wilcox-O'Hearn on August 16, 2013

This open letter is in response to the recent shutdown of Lavabit , the ensuing shutdown of Silent Circle's “Silent Mail” product, Jon Callas's posts about the topic on G+, and Phil Zimmermann's interview in Forbes. Also, of course, all of this is unfolding in the context of the 2013 Mass Surveillance Scandal. Dear Phil and Jon: Hello there! It is good to have a chance to chat with you in public. Please accept the following in the spirit of constructive criticism in which it is intended. For...

Read more