
“The US government uses it to protect internal communications, the Tor project uses it to help assure anonymity, it is the mechanism used to prove ownership of bitcoins, it provides signatures in Apple’s iMessage service, it is used to encrypt DNS information with DNSCurve, and it is the preferred method for authentication for secure Web browsing over SSL/TLS. A growing number of sites use ECC to provide perfect forward secrecy, which is essential for online privacy. First generation cryptographic algorithms like RSA and Diffie-Hellman are still the norm in most arenas, but ECC is quickly becoming the go-to solution for privacy and security online.”
Related posts:
China's Largest Conglomerate Is On The Verge Of Bankruptcy
What's cooking in WHO powwow?
Microsoft allows Bitcoin trading app on Windows Phone 8
European Central Bankers Promise Monetary Inflation for Years
CDC Report Fatally Shoots Obama’s Theory of Gun Violence
India Gets The (Bitcoin) Green Light
Homeless, Unemployed, and Surviving on Bitcoins
The "Be Very Afraid" Society
CNY Challenges EUR For Second Largest Bitcoin Exchange Volume
Prosecutors drop key evidence at trial to avoid explaining “stingray”
Mitt Romney: The Great Deformer - David Stockman
Timeline: How ‘Salvator Mundi’ Went From £45 to $450 Million in 59 Years
LAPD Spied on 21 Using StingRay Anti-Terrorism Tool
North Carolina Allows HOA Rent-A-Cops To Make Illegal DUI Arrests
DingXtra - Interview with Ray Kurzweil