Back to Results
First PageMeta Content
Disk encryption / Key management / Cypherpunk / Passphrase / Key / Password / Crypt / Deniable encryption / Cryptography / Cryptographic software / Rubberhose


The Idiot Savants’ Guide to Rubberhose Suelette Dreyfus
Add to Reading List

Document Date: 2013-05-01 15:03:55


Open Document

File Size: 33,65 KB

Share Result on Facebook

City

Guatamalia / /

Company

Intel / /

Country

Congo / Russia / United Kingdom / East Timor / Iraq / Sudan / /

IndustryTerm

real estate / data storage device / bank statements / conventional disk encryption systems / cryptographic algorithms / cryptography algorithms / storage device / symmetric cipher algorithm / law enforcement agents / file systems / block cipher algorithm / law enforcement / symmetric algorithms / e-r / mathematical algorithm / /

NaturalFeature

Cayman Island / /

OperatingSystem

FreeBSD / NetBSD / Linux / Windows NT / /

Organization

US Federal Reserve / Ministry of Cleansing of Public Ideas / /

Person

Rashid / Julian Assange / /

Position

spy / unpaid lawyer / programmer / /

ProgrammingLanguage

C / /

ProvinceOrState

Kosovo / /

Technology

encryption / symmetric algorithms / cryptography / symmetric cipher algorithm / Linux / encryption system / block cipher algorithm / operating system / mathematical algorithm / cryptography algorithms / /

URL

http /

SocialTag