Security problems and cryptographic solutions for human rights organizations working on the Internet
Click here to start
Table of Contents
Technical jargon for Internet security
Data Security Isn't So Hard...
Sample of Encrypted Text
Message Integrity and Authenticity
To prevent spoofing, use digital signatures.
Digitally-Signed Urgent-Action Message
What if you donít want to draw attention to yourself by using cryptography?
How Steganography Works
Without Strong Cryptography...
Is key recovery an acceptable compromise?
Next problem with key recovery.
The criticism of tyranny is the most profound form of democratic speech. It is also the most dangerous.
Cryptography: Scientific Freedom and Human Rights Issues