“The US government uses it to protect internal communications, the Tor project uses it to help assure anonymity, it is the mechanism used to prove ownership of bitcoins, it provides signatures in Apple’s iMessage service, it is used to encrypt DNS information with DNSCurve, and it is the preferred method for authentication for secure Web browsing over SSL/TLS. A growing number of sites use ECC to provide perfect forward secrecy, which is essential for online privacy. First generation cryptographic algorithms like RSA and Diffie-Hellman are still the norm in most arenas, but ECC is quickly becoming the go-to solution for privacy and security online.”
(Visited 38 times, 1 visits today)
Related posts:
The New Politics of Pot: The 2014 Candidates Who Want to Legalize It
Tennessee: Improper to Arrest Someone for Passing DUI Test
Russia warns of nuclear disaster if Syria is hit
Obamacare 'SHOP' Web Based Sign Up Won't Be Ready Until 2014
Mirror, Mirror, on the Wall, Which States Provide the Most Handouts of All?
Hunt for Silk Road users and Bitcoin fortunes intensifies
Is It Time to Boycott All US Bitcoin Companies?
Student Loan Debt Will Exceed Median Annual Income For College Grads By 2023
Trump Makes First Step To Revoke Iran Nuclear Deal
What is the Money Supply?
AP: Sources Aren't Talking To Us Out Of Fear Of US Government Spying
Japanese companies using ‘banishment rooms’ to push employees to resign
New York: Judge Rules Against Use Of X-Rays During Traffic Stops
BTC China Reports 10x Volume Increase From $5m to $50 million
Drone-Hunter's Motto: "The Fly in Town -- they Get Shot Down"