
“The US government uses it to protect internal communications, the Tor project uses it to help assure anonymity, it is the mechanism used to prove ownership of bitcoins, it provides signatures in Apple’s iMessage service, it is used to encrypt DNS information with DNSCurve, and it is the preferred method for authentication for secure Web browsing over SSL/TLS. A growing number of sites use ECC to provide perfect forward secrecy, which is essential for online privacy. First generation cryptographic algorithms like RSA and Diffie-Hellman are still the norm in most arenas, but ECC is quickly becoming the go-to solution for privacy and security online.”
Related posts:
RIP Mikhail Timofeyevich Kalashnikov
Montana Prosecutor Declares War On Pregnant Mothers Who Drink
How CBP Illegally Tried to Unmask a Rogue Twitter Account
Cops Interrogate Family For Allowing Kids To Play Outside
City Removes “Don’t Tread on Me” Flag From Abandoned Building
Libertarian state senate candidate gets arrested at pro-marijuana rally
Cops Ordered to Return $1+ Million Seized From Innocent Woman
The U.S. blacklist of Russian oligarchs: what is the real impact?
Unwise Deepening of an Unnecessary Crisis
IRS Refunds 4 Billion Dollars a Year to Illegal Immigrants While Pursuing US Citizens Abroad
Cop Acquitted After Killing Man Crawling On Hotel Floor Begging for His Life
Peter Schiff Goes to Puerto Rico
21 Drone Pilots Face Racketeering Charges In Arizona
Dutch Banking Malware Gang Busted: Bitcoin's Role
CoinJar Receives Australia's First Major Bitcoin Investment