“The US government uses it to protect internal communications, the Tor project uses it to help assure anonymity, it is the mechanism used to prove ownership of bitcoins, it provides signatures in Apple’s iMessage service, it is used to encrypt DNS information with DNSCurve, and it is the preferred method for authentication for secure Web browsing over SSL/TLS. A growing number of sites use ECC to provide perfect forward secrecy, which is essential for online privacy. First generation cryptographic algorithms like RSA and Diffie-Hellman are still the norm in most arenas, but ECC is quickly becoming the go-to solution for privacy and security online.”
Related posts:
Arizona House Panel Says Cops Can Destroy Marijuana, Even If Patients Had Right To It
Details About BitcoinWallet.com $250,000 Reported Sale
The New Boogieman: Military Grade Weapons
Nepal police seize smuggled gold bound for India
When the Meter Feeds on You
Lavabit Founder Ladar Levison, The Rosa Parks of Internet Freedom
Missouri man facing charges for using fake penis to pass drug test
The first Bitcoin based bank in Cyprus is coming!
Connecticut enacts nation’s highest minimum wage at $10.10/hr
Predators in Your Backyard?
If It’s Not About The Money . . .
Larry Summers's Billion-Dollar Bad Bet at Harvard
Feds Order 14 Million Potassium Iodide Tablets, Refuse Comment
Terror Defendant Challenges Evidence Gathered by NSA Spying
CIA Torture Report Now Fast-Tracked, Over Republicans' Objections