Back to Results
First PageMeta Content
Public-key cryptography / Secure communication / Cryptographic software / Extensible Messaging and Presence Protocol / HTTP Secure / Opportunistic encryption / X.509 / Transport Layer Security / Simple Mail Transfer Protocol / Cryptography / Computing / Cryptographic protocols


File: /tmp/hosts-2.txt IS IT TIME TO BRING BACK THE HOSTS FILE? INELEGANT ENCRYPTION SOLUTIONS FOR AN INELEGANT NETWORK? Peter Eckersley, Technology Projects Director Electronic Frontier Foundation
Add to Reading List

Document Date: 2014-02-07 14:41:45


Open Document

File Size: 22,59 KB

Share Result on Facebook

IndustryTerm

Internet security / software versions / communications protocols / Internet engineering community / Internet deployment / given protocol / Web browsers / clean solutions / well chosen compression algorithm / communications channels / captive portal / INTERNET The / good tools / /

OperatingSystem

Windows XP / /

Organization

Electronic Frontier Foundation / /

Person

DANE DNSSEC / Peter Eckersley / /

Position

Major / Director / Technology Projects / Director Technology Projects / /

Technology

ENCRYPTION / HTTP / Public Key Infrastructure / given protocol / well chosen compression algorithm / communications protocols / /

SocialTag