Encryption

Threats and Usability of Secure Voice

July 10, 2012

In my previous post I found that end-to-end encryption with OSTN is both effective and usable. There are two important things the user must be aware …

A Network Analysis of Encrypted Voice over OSTN

July 5, 2012

Introduction to OSTN The OSTN network stands for Open Source Telephony Network. It is a federated network standard for supporting Internet calling …

IOCipher lives! encrypted virtual file system for Android

May 17, 2012

Nathan and I just got the first complete test of IOCipher working in the IOCipherServer/SpotSync app. We created a filesystem sqlite.db file, then …

Singing and Dancing for Encryption

April 19, 2012

If you see me dancing or singing with my phone in my hand, I may not just be having a great time, but also creating an encryption key. Part of the …

User scenarios to guide our crypto development

April 14, 2012

At Guardian Project, we find user-centered development to be essential to producing useful software that addresses real world needs. To drive this, we …

Transparent encrypted virtual disks for Android (we call it IOCipher)

April 3, 2012

When using phones, laptops, computers, etc. it feels like a private experience, as if our screen was the same as a piece of paper, and when that paper …

How many ways to store 5 numbers?

February 23, 2012

At the core of all software that aims to be secure, private and anonymous is encryption, or as I think of it, amazing math tricks with really large …

Introducing InformaCam

January 20, 2012

These are interesting times, if you go by Times Magazine as an indicator. The magazine’s person of the year for 2011 was The Protester, preceded in …

How To: Lockdown Your Mobile E-Mail

July 9, 2010

Update 2015-04-27: We now recommend OpenKeychain over APG, the app described in this blog post. The set up is drastically easier, so you probably …