
“The US government uses it to protect internal communications, the Tor project uses it to help assure anonymity, it is the mechanism used to prove ownership of bitcoins, it provides signatures in Apple’s iMessage service, it is used to encrypt DNS information with DNSCurve, and it is the preferred method for authentication for secure Web browsing over SSL/TLS. A growing number of sites use ECC to provide perfect forward secrecy, which is essential for online privacy. First generation cryptographic algorithms like RSA and Diffie-Hellman are still the norm in most arenas, but ECC is quickly becoming the go-to solution for privacy and security online.”
Related posts:
Marching Toward Smaller Government
World’s First 3D Printing Photo Booth to Open
'Don't Shoot My Dog' Laws Proposed
Want to Defend Your Privacy?
Jeff Thomas Responds: Questions on Gold Ownership
Christian school defies Arkansas attorney general, arms teachers & posts sign
CoinLab: new brands will be built around Bitcoin technology
Israeli police head to US to aid in Boston Marathon bombing investigation
Germany's 10-year government bond yields are about to go negative
Phoenix Police “Help” a Man to Death
Galt's Gulch Chile: First Libertarian Community Accepting Bitcoin
NSA slides: Steve Jobs Is 'Big Brother' And Smartphone Users Are 'Zombies'
Government hospitals removing wrong reproductive parts becomes a trend
Homeland Security "Constitution Free" Zones Inside US Ignored By Media
Jim Rogers goes Short US Treasuries, talks JP Morgan Silver and a Boom in North Korea!