
“The US government uses it to protect internal communications, the Tor project uses it to help assure anonymity, it is the mechanism used to prove ownership of bitcoins, it provides signatures in Apple’s iMessage service, it is used to encrypt DNS information with DNSCurve, and it is the preferred method for authentication for secure Web browsing over SSL/TLS. A growing number of sites use ECC to provide perfect forward secrecy, which is essential for online privacy. First generation cryptographic algorithms like RSA and Diffie-Hellman are still the norm in most arenas, but ECC is quickly becoming the go-to solution for privacy and security online.”
Related posts:
Albany police: SWAT used poor black neighborhood for training because it’s ‘realistic’
Bullion Bitcoin to Launch Professional Gold-Bitcoin Exchange
UK downplays talk of regulating Bitcoin
TSA hires a priest excluded from clergy for child molestation
Egyptian army tanks mow down peaceful protesters
Amazon Bans Confederate Flags, Still Sells Nazi Merchandise
Marc Faber: Not Even Gold Will Save You From What Is Coming
France Taxes America: The Robin Hood Tax
LTE wireless connections used by billions aren’t as secure as we thought
Gold Year-Over-Year Price Change At An Extreme Low
Gun Confiscation Begins in California
Elon Musk Might Not Be Too Unhappy About Russia's Space Station Ban
Florida Mom Gets 20 Years For Firing Warning Shot After Attack
Kerry Bloody Hands Protest
Dashcam catches cops in unbelievable lies in man’s false arrest