Simplifying Cryptography Part 1: Level Beginners. 

For centuries, kings, queens, and generals have relied on efficient communication in order to govern their countries and command their armies. At the same time, they have all been aware of the consequences of their messages falling into the wrong hands, revealing precious secrets to rival nations and betraying vital information to opposing forces. It was the threat of enemy interception that motivated the development of codes and ciphers: techniques for disguising a message so that only the intended recipient can read it.
The desire for secrecy has meant that nations have operated code making departments, which were responsible for ensuring the security of communications by inventing and implementing the best possible codes. At the same time, enemy codebreakers have attempted to break these codes and steal secrets. Codebreakers are linguistic alchemists, a mystical tribe attempting to conjure sensible words out of meaningless symbols. The history of codes and ciphers is the story of the centuries-old battle between code makers and codebreakers, an intellectual arms race that has had a dramatic impact on the course of history.

Continue reading “Simplifying Cryptography Part 1: Level Beginners. “

Decrypting Privacy and Security methods Part III

Encrypted Cloud Storage

Yes, Stop using Dropbox, Google Drive, Apple icloud. here I will share some interesting encrypted cloud storage.

Hosted

Seafile – 100 GB Storage for $10/month

Seafile offers 100 GB Storage for $10/month but also gives you the opportunity to host on your own server. Your data is stored in Germany or with Amazon Web Service in the US for the cloud version. Encrypt files with your own password.

Continue reading “Decrypting Privacy and Security methods Part III”