
It doesn’t matter why you want to encrypt what you send over the Internet. Maybe you care about the privacy of your personal data, maybe you’re trying to bypass government restrictions, or you have other reasons. Today, everyday users have access to a solid range of cryptographically strong protocols and the software that implements them. In this article, we’ll walk through the major categories of these solutions (many of them well known), discuss their security, and review the available implementations.
Read full article →