End-to-end encryption provides strong protection for keeping your communications private, but not every messaging app uses it, and even some of the ones that do don’t have it turned on by default.
Personal ads of ‘the Agony Column’ were full of longing, tragedy and profound misfortune. Intrigue they generated has had an enduring effect on literature and film.
Passwords are both annoying to use and vulnerable to hackers. Google is moving to support stronger, easier-to-use passkeys (and other tech companies are close behind).
Canada is well positioned to gain far-reaching economic and social benefits from the rapidly developing quantum industry, but it must act now to secure its success.
Camélia Radu, Université du Québec à Montréal (UQAM) and Nadia Smaili, Université du Québec à Montréal (UQAM)
An integrative cybersecurity and data protection program will help firms adjust their management protocols and be better prepared for future cybersecurity trends.
Apple will scan all photos uploaded to the cloud for child sexual abuse without actually looking at the photos. Privacy experts are concerned by the lack of public accountability.
The AN0M app was programmed by law enforcement to allow ‘back-door’ access. This led to the retrieval of information that culminated in hundreds of search warrants.
Researchers tried several times to have the document declassified, including in 1992, 2004 and 2016. It was initially written to help American NSA agents crack difficult coded messages.
Having an end-to-end encrypted messaging ‘ecosystem’ is a great way for Facebook to evade the full wrath of the law. It has come at a convenient time, too.
Facebook is planning to put end-to-end encryption on all its messaging services soon. But governments aren’t happy about it, as it could make it harder to catch criminals.
The first internet communication was underwhelming, thanks to a computer crash. But a lot has happened since then – including key decisions that helped build the internet of today.
Computer capabilities have boosted our decryption technology to great heights. How will the future compare to a past, one in which codes were thought to be a means of communicating after death?
A recent proposal by the United Kingdom’s Government Communications Headquarters agency suggests building in law enforcement access to encrypted communications. This has implications for users’ digital rights and privacy.
Telegram enabled protesters in Hong Kong to evade surveillance, but a DDoS attack and the arrest of a group administrator undermined the ability of protesters to organise and communicate.
In a recent Canadian court case, defence and prosecution argued over whether a suspect was required to provide his password to allow for a search warrant to be executed on his phone.