For many of today’s titans of technology, the real value of their companies lies in user generated content and connections. Take LinkedIn for example Read More…
Encryption ensures the protection of data from being accessed or understood should it fall into the wrong hands – and for the most part, that is exactly as it should be. The challenge comes when Read More…
In the first two parts of this series I examined the several different types of voter fraud as outlined by a 1982 Grand Jury Report. I then examined how in Read More…
In the first part of this series I looked at the historical context of voter fraud and the seminal findings of a 1982 Grand Jury which provided a comprehensive Read More…
The possibility of voter fraud has made recent headlines, with some arguing it is a widespread problem. While statistics suggest that voting fraud in Read More…
A proven technical basis for highly efficient multiple-variant attacks on VeraCrypt. Encryption is tightly intertwined with privacy today. In addition to privacy Read More…
Today, the vast majority of communications are digital, and as a result the use of bulk encryption is now widespread—more sophisticated and harder to penetrate than ever. Read More…