Are Consumer Crypto Systems Too Hard To Use?

In a previous post,  I summarized some academic papers in which prominent cryptographers and other security experts took a very skeptical look at current cryptography, both research and practical systems. It’s not just e-mail plugins and other desktop computer applications that can disappoint us. One of the papers showed that the APCO Project 25 two-way […]
Read More ›

Threats in Space

Satellite communications started before the invention of the Internet, but that head start has not led to it being further along in security. It has usually been practiced only by governments, government contractors, and organizations like large-scale telecommunications companies that often have a quasi-governmental nature (and in many countries, literally are government ministries). That led […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.