Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Version 2.6
Last Updated January 9thMay 5th, 20202023

The WHY

Over the past decade there have been a number of high-profile news stories about the insecure state of our Internet and mobile device communications. From data breaches at well known retailers, to USB and firmware attacks on computers, to our intelligence agencies requiring providers to use less secure versions of encryption, to Eric Snowden's revelations about the NSA's and the UK's Government Communications Headquarters (GCHQ) bulk data gathering with Stingray and Tempora, to vendors required to use proprietary state-approved standards (like WAPI in China), never before has our private data been more vulnerable or come under such risk of compromise by unknown parties.

...