End-to-End Crypto: Messaging and Chat

There are many end-to-end encrypted messaging systems available for secure, mobile communication. Each has its own advantages and disadvantages; understanding the way each works will help you decide which is right for you.

RSA Underscores the Importance of Privacy

Issues of privacy are becoming more prevalent and more significant, and Tozny’s E3DB was built to help developers address privacy needs within the systems they are building.

Visit Tozny at the RSA Conference

We are now in an age where security can breached with just a simple push of a button. With today’s technological breakthroughs come an increasing demand for a more well-rounded and tightened cybersecurity. The tools … Read More

Top Ten Privacy Checklist Before Direct Action

Greg Stromire provided a great list of privacy protections you can take before participating in direct action as a part of his recent Data Privacy for Activists workshop. Because your mobile device is likely to be one of the most obvious ways of breaching your privacy, many of these are about protecting you mobile device.

Data Privacy for Activists

This past weekend, one of our great engineers, Greg Stromire hosted a workshop entitled“Data Privacy for Activists” here in Portland. The twenty-five very curious audience members dug into topics like: password practices; easy VPN use; encrypted email; protecting your mobile device.

With how relevant this workshop was in the current environment, we thought we would post the top take-aways that Greg presented so everyone could benefit from his presentation.