Dismiss this notice
Thor Foresight Home Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8636

Dismiss this notice
Avast Premier Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8637

Dismiss this notice
Kryptel Standard Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8635

Dismiss this notice
Driver Easy Professional Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8634

Dismiss this notice
O&O Software Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8633

Dismiss this notice
Ashampoo WinOptimizer 17 Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8626

Dismiss this notice
AIDA64 Extreme Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8625

Dismiss this notice
Ashampoo Movie Studio Pro 3 Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8624

Dismiss this notice
AirVPN Halloween 2019 Giveaway - https://www.geeks.fyi/showthread.php?tid=8623

Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
End-to-end encryption explained
#1
Quote:When you chat with your friend or a loved one, the messages you enter travel a long way across the network. A lot can happen along the way. End to end encryption is one way to protect your data, but is it right for everyone?
 
What is encryption?Encryption is the encoding of a message so that only the intended addressee can decode it. Encryption software turns your message into an indecipherable sequence called ciphertext. Even if someone gets hold of your message, they won’t be able to access the encrypted data unless they have the key. Military-grade encryption is virtually impossible to crack as it uses 256-bit keys that generate 2^256 possible combinations. There are no supercomputers yet that can crack such a key within a reasonable amount of time.
 
Types of encryptionSymmetric encryptionSymmetric encryption is when a sender and a receiver use the same private encryption key to decode and encode an encrypted message.
The main drawback is that the key should be shared between the parties. Unless a secure tunnel is established, an interceptor might snatch the key and decipher the message.
[Image: what-is-end-to-end-encryption-1.png]
Full read : https://nordvpn.com/blog/what-is-end-to-end-encryption/
[-] The following 1 user Likes Herran's post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username:


Password:





[-]
Recent Posts
Avast Blog_News: Avast fights off cyber-...
Avast deploys h...harlan4096 — 09:51
Opera Software tests Cloudflare DNS over...
Opera Software ...harlan4096 — 09:41
Avast Blog_Security News: Fake iPhone ja...
Plus, a botnet ...harlan4096 — 06:06
Emsisoft releases new decryptor for STOP...
While STOP (Djv...harlan4096 — 06:01
What Are The Cybersecurity Issues With R...
And How To Keep...harlan4096 — 05:58

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (41)Michaelaceve
avatar (31)QuadirLigh
avatar (32)Mblippek
avatar (38)viecontAceve
avatar (34)Michaelcrini

[-]
Online Staff
There are no staff members currently online.

>