Public Key Cryptography will continue to liberate a global society

Summary

Insidious Information Loss

Reliable Information Protection

Our Opportunity to Protect Information

A Proposition

Encryption and Passwords

When to Encrypt?

Encryption Tools

Password Managers

Data File Encryptors

File-by-File Encryption Approach

Cloud Services

Cloud Storage, Encryption and management of private keys

Automatic Directory Encryption and Cloud Services

Cloud Encryption Workflows Compared

Enterprise Class File Encryption

Social Identity, Web of Trust and Encrypted Communications

Keybase — Public Key Encryption, PKI, Chat ++

The Future of Public Key Cryptography

Public Key Tooling for the Decentralised Age?

Access via password or private key?

Recommendations

Software Engineering, Cyber Threat Hunting and Intelligence, systems resilience and reliability.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store