Public Key Cryptography will continue to liberate a global society

Image for post
Image for post

Summary

Insidious Information Loss

Image for post
Image for post

Reliable Information Protection

Image for post
Image for post

Our Opportunity to Protect Information

A Proposition

Image for post
Image for post

Encryption and Passwords

Image for post
Image for post

When to Encrypt?

Encryption Tools

Image for post
Image for post

Password Managers

Image for post
Image for post

Data File Encryptors

Image for post
Image for post

File-by-File Encryption Approach

Image for post
Image for post

Cloud Services

Cloud Storage, Encryption and management of private keys

Image for post
Image for post

Automatic Directory Encryption and Cloud Services

Image for post
Image for post
Image for post
Image for post

Cloud Encryption Workflows Compared

Enterprise Class File Encryption

Image for post
Image for post

Social Identity, Web of Trust and Encrypted Communications

Image for post
Image for post

Keybase — Public Key Encryption, PKI, Chat ++

Image for post
Image for post
Image for post
Image for post

The Future of Public Key Cryptography

Image for post
Image for post

Public Key Tooling for the Decentralised Age?

Image for post
Image for post

Access via password or private key?

Image for post
Image for post

Recommendations

Software Engineering, Cyber Threat Hunting and Intelligence, systems resilience and reliability.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store