Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Version 2.56
Last Updated May 9thJanuary 6th, 20162020

The WHY

Over the past decade there have been a number of high-profile news stories about the insecure state of our Internet and mobile device communications. From data breaches at well known retailers, to USB and firmware attacks on computers, to our intelligence agencies requiring providers to use less secure versions of encryption, to Eric Snowden's revelations about the NSA's and the UK's Government Communications Headquarters (GCHQ) bulk data gathering with Stingray and Tempora, to vendors required to use proprietary state-approved standards (like WAPI in China), never before has our private data been more vulnerable or come under such risk of compromise by unknown parties.

...

3) Use RFID shielded carrying cases and wallets for carrying items that contain RFID chips like passports, transit cards, keyless car entry and start fobs, and newer chipped credit cards.

...