“The US government uses it to protect internal communications, the Tor project uses it to help assure anonymity, it is the mechanism used to prove ownership of bitcoins, it provides signatures in Apple’s iMessage service, it is used to encrypt DNS information with DNSCurve, and it is the preferred method for authentication for secure Web browsing over SSL/TLS. A growing number of sites use ECC to provide perfect forward secrecy, which is essential for online privacy. First generation cryptographic algorithms like RSA and Diffie-Hellman are still the norm in most arenas, but ECC is quickly becoming the go-to solution for privacy and security online.”
Related posts:
Syria crisis: Moscow reminds US of Iraq mistakes
Chuck Norris shuts down wannabe Bitcoin with just his fingers
Anatomy of a hack: How crackers ransack passwords like “qeadzcwrsfxv1331”
11 Hotels and hostels that accept Bitcoin
These Startups Are Betting Everything on Bitcoin
Candidate Obama Debates President Obama On Government Surveillance
Are cryptocurrencies the new dotcom stocks?
Revealed: Doug Casey’s Next Crisis Investment—Cyprus
Buttercoin Uses Bitcoin To Attack The $500B-A-Year Remittances Economy
Chinese Tourists with Pockets Full of Dollars
The Best Enemy Money Can Buy
Air Force erases drone strike data amid criticisms
Massachusetts Snatches Child Over Psychiatric Treatment Disagreement
The Latest in Local Government Pettiness
Congress Wants the IRS to Cancel Your Passport