187:– a rule to convert a piece of information (for example, a letter, word, phrase, or gesture) into another form or representation (one sign into another sign), not necessarily of the same type. In communications and information processing, encoding is the process by which information from a source is converted into symbols to be communicated. Decoding is the reverse process, converting these code symbols back into information understandable by a receiver. One reason for coding is to enable communication in places where ordinary spoken or written language is difficult or impossible. For example, semaphore, where the configuration of flags held by a signaler or the arms of a
1978:
652:
the downloader, or had knowledge of the use to which unknown others might be putting their connection. An example of this was the Tammie Marson case, where neighbours and anyone else might have been the culprit in the sharing of copyright files. Conversely, in other cases, people deliberately seek out businesses and households with unsecured connections, for illicit and anonymous
Internet usage, or simply to obtain free
88:. Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot intercept what is said. Other than spoken face-to-face communication with no possible eavesdropper, it is probable that no communication is guaranteed to be secure in this sense, although practical obstacles such as legislation, resources, technical issues (interception and
1988:
1044:
407:("hidden writing") is the means by which data can be hidden within other more innocuous data. Thus a watermark proving ownership embedded in the data of a picture, in such a way it is hard to find or remove unless you know how to find it. Or, for communication, the hiding of important data (such as a telephone number) in apparently innocuous data (an MP3 music file). An advantage of steganography is
25:
352:" attack whereby a third party who can 'see' the establishment of the secure communication is made privy to the encryption method, this would apply for example to the interception of computer use at an ISP. Provided it is correctly programmed, sufficiently powerful, and the keys not intercepted, encryption would usually be considered secure. The article on
419:
Unwanted or malicious activities are possible on the web since the internet is effectively anonymous. True identity-based networks replace the ability to remain anonymous and are inherently more trustworthy since the identity of the sender and recipient are known. (The telephone system is an example
651:
the connection – that is, use it without the owner being aware. Since many connections are left open in this manner, situations where piggybacking might arise (willful or unaware) have successfully led to a defense in some cases, since it makes it difficult to prove the owner of the connection was
562:
specialist cited in the same source, "Security-conscious corporate executives routinely remove the batteries from their cell phones" since many phones' software can be used "as-is", or modified, to enable transmission without user awareness and the user can be located within a small distance using
269:
Each of the three types of security is important, and depending on the circumstances, any of these may be critical. For example, if a communication is not readily identifiable, then it is unlikely to attract attention for identification of parties, and the mere fact a communication has taken place
160:, but the conversation would remain clear to authorized parties. As secrecy was paramount, the location of the Green Hornet was only known by the people who built it and Winston Churchill. To maintain secrecy, the Green Hornet was kept in a closet labeled 'Broom Cupboard.'' The Green Hornet used a
99:
With many communications taking place over long distance and mediated by technology, and increasing awareness of the importance of interception issues, technology and its compromise are at the heart of this debate. For this reason, this article focuses on communications mediated or intercepted by
635:
is not tappable, nor that the proxy does not keep its own records of users or entire dialogs. As a result, anonymous proxies are a generally useful tool but may not be as secure as other systems whose security can be better assured. Their most common use is to prevent a record of the originating
605:
Analogue landlines are not encrypted, it lends itself to being easily tapped. Such tapping requires physical access to the line which can be easily obtained from a number of places, e.g. the phone location, distribution points, cabinets and the exchange itself. Tapping a landline in this way can
428:
Recently, anonymous networking has been used to secure communications. In principle, a large number of users running the same system, can have communications routed between them in such a way that it is very difficult to detect what the complete message is, which user sent it, and where it is
624:
system of any kind (payphone, Internet cafe) is often secure, however if that system is used to access known locations (a known email account or 3rd party) then it may be tapped at the far end, or noted, and this will remove any security benefit obtained. Some countries also impose mandatory
640:, or address, being left on the target site's own records. Typical anonymous proxies are found at both regular websites such as Anonymizer.com and spynot.com, and on proxy sites which maintain up to date lists of large numbers of temporary proxies in operation.
553:
Cellphones can easily be obtained, but are also easily traced and "tapped". There is no (or only limited) encryption, the phones are traceable – often even when switched off – since the phone and SIM card broadcast their
International Mobile Subscriber Identity
343:
is a method in which data is rendered hard to read by an unauthorized party. Since encryption methods are created to be extremely hard to break, many communication methods either use deliberately weaker encryption than possible, or have
152:. In the beginning, the calls were made using a voice scrambler, as this was thought to be secure. When this was found to be untrue, engineers started to work on a whole new system, which resulted in the Green Hornet or
706:– some email networks are designed to provide encrypted and/or anonymous communication. They authenticate and encrypt on the users own computer, to prevent transmission of plain text, and mask the sender and recipient.
1000:
Pell, Stephanie K., and
Christopher Soghoian. 2014. "Your secret stingray's no secret anymore: The vanishing government monopoly over cell phone surveillance and its impact on national security and consumer privacy."
270:(regardless of content) is often enough by itself to establish an evidential link in legal prosecutions. It is also important with computers, to be sure where the security is applied, and what is covered.
631:
are another common type of protection, which allow one to access the net via a third party (often in a different country) and make tracing difficult. Note that there is seldom any guarantee that the
367:?" If the response is affirmative, then the conversation proceeds in Navajo, otherwise it uses the common language of the two speakers. This method does not generally provide
80:
is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to
686:
to secure all instant messages to other users of the same software. Some instant messaging clients also offer end-to-end encrypted file transfer support and group messaging.
558:). It is possible for a cellphone company to turn on some cellphones when the user is unaware and use the microphone to listen in on you, and according to James Atkinson, a
363:
is a lower security method to generally increase the percentage of generic traffic which is encrypted. This is analogous to beginning every conversation with "Do you speak
278:
A further category, which touches upon secure communication, is software intended to take advantage of security openings at the end-points. This software category includes
191:
encodes parts of the message, typically individual letters and numbers. Another person standing a great distance away can interpret the flags and reproduce the words sent.
348:
inserted to permit rapid decryption. In some cases government authorities have required backdoors be installed in secret. Many methods of encryption are also subject to "
359:
Encryption can be implemented in a way that requires the use of encryption, i.e. if encrypted communication is impossible then no traffic is sent, or opportunistically.
109:, an approach under present development that achieves security in general at the potential cost of compelling obligatory trust in corporate and government bodies.
457:
Typically, an unknown device would not be noticed, since so many other devices are in use. This is not assured in reality, due to the presence of systems such as
35:
989:
1076:
665:
741:
Several secure communications networks, which were predominantly used by criminals, have been shut down by law enforcement agencies, including:
46:
514:, or even in extreme cases by monitoring the tiny electrical signals given off by keyboard or monitors to reconstruct what is typed or seen (
387:
938:, Boston Studies in the Philosophy and History of Science, vol. 324, Cham: Springer International Publishing, pp. 159–187,
492:
The placing covertly of monitoring and/or transmission devices either within the communication device, or in the premises concerned.
465:, which can monitor communications over entire networks, and the fact that the far end may be monitored as before. Examples include
843:
555:
1991:
799:
536:
beam off a window of the room where a conversation is held, and detecting and decoding the vibrations in the glass caused by the
462:
1800:
1595:
594:) track and store users' position information, so that movements for months or years can be determined by examining the phone.
669:
1048:
951:
901:
881:
1220:
1069:
411:, that is, unless one can prove the data is there (which is usually not easy), it is deniable that the file contains any.
1351:
697:
1770:
1825:
64:
317:
which check all web pages being read and identify and remove common nuisances contained. As a rule they fall under
1981:
1062:
226:" and similar anonymous group structures – it is difficult to identify who said what when it comes from a "crowd"
597:
The U.S. Government also has access to cellphone surveillance technologies, mostly applied for law enforcement.
825:
648:
383:
259:
Random traffic – creating random data flow to make the presence of genuine communication harder to detect and
2027:
2012:
2017:
1316:
1291:
647:") are left in their unsecured state. The effect of this is that any person in range of the base unit can
230:
1941:
1897:
1301:
794:
390:
ensures that a wireless communication link is provably secure with communications and coding techniques.
1014:
591:
223:
506:
Any security obtained from a computer is limited by the many ways it can be compromised – by hacking,
2022:
1695:
1331:
1026:
714:
provide a higher level of anonymity by using a network of anonymizing intermediaries, similar to how
1931:
1835:
1805:
1500:
1278:
1177:
772:
729:
675:
360:
349:
279:
39:
that states a
Knowledge editor's personal feelings or presents an original argument about a topic.
1926:
1795:
1665:
1381:
777:
715:
487:
434:
293:
These types of activity are usually addressed with everyday mainstream security methods, such as
209:
1953:
1946:
1785:
1712:
1560:
42:
1958:
972:
679:
653:
408:
149:
126:
990:
Wall Street
Journal: How concerned are you that the iPhone tracks and stores your location?
725:
567:
and now using built in GPS features for newer models. Transceivers may also be defeated by
559:
511:
345:
298:
85:
8:
1750:
1238:
1156:
1146:
1141:
1085:
821:
1740:
1545:
1535:
515:
1508:
1389:
1136:
1121:
947:
897:
877:
848:
767:
507:
501:
318:
283:
239:
145:
105:
724:
and web chat – Some IRC clients and systems use client-to-server encryption such as
1480:
939:
782:
527:
260:
122:
621:
1730:
1660:
1589:
1555:
1540:
1452:
1419:
1394:
933:
683:
628:
606:
enable an attacker to make calls which appear to originate from the tapped line.
458:
177:
Security can be broadly categorized under the following headings, with examples:
943:
1490:
1286:
750:
643:
A recent development on this theme arises when wireless
Internet connections ("
368:
188:
134:
2006:
1936:
1735:
1409:
914:
837:
804:
568:
564:
470:
446:
404:
399:
376:
234:
216:
Hiding the parties to a communication – preventing identification, promoting
204:
156:. With the Green Hornet, any unauthorized party listening in would just hear
81:
1720:
1675:
1467:
1296:
1230:
1093:
829:
703:
572:
161:
118:
93:
356:
examines the key requirements for certain degrees of encryption security.
1765:
1685:
1630:
1550:
1054:
364:
310:
194:
157:
130:
1871:
1815:
1745:
1620:
1615:
1565:
1530:
1523:
1485:
1475:
1414:
1200:
1111:
1101:
746:
637:
579:
537:
340:
335:
199:
89:
1702:
1690:
1680:
1645:
1610:
1605:
1518:
1424:
1326:
1258:
1195:
1106:
742:
707:
632:
615:
442:
372:
294:
217:
1887:
1861:
1790:
1650:
1640:
1625:
1570:
1447:
1399:
1366:
1341:
1321:
1306:
1151:
1116:
532:
Sounds, including speech, inside rooms can be sensed by bouncing a
466:
353:
711:
1910:
1905:
1856:
1670:
1404:
1371:
1361:
1336:
1268:
1248:
1190:
1131:
1125:
919:
816:
314:
306:
287:
245:
153:
141:
666:
Comparison of instant messaging clients § Secure messengers
1963:
1810:
1356:
1311:
1263:
1215:
1043:
587:
583:
430:
302:
140:
One of the most famous systems of secure communication was the
1866:
1840:
1780:
1755:
1513:
1457:
1442:
1346:
1253:
1210:
1205:
1185:
853:
644:
533:
476:
248:
methods – through unauthorized third-party systems, or relays
1655:
1434:
693:
689:
184:
36:
personal reflection, personal essay, or argumentative essay
1725:
1635:
1243:
833:
721:
438:
375:
but it does protect the content of the conversation from
256:"Security by obscurity" – similar to needle in a haystack
92:), and the sheer volume of communication serve to limit
670:
Comparison of VoIP software § Secure VoIP software
788:
543:
659:
452:
429:ultimately coming from or going to. Examples are
253:Hiding the fact that a communication takes place
2004:
1027:'Extortionist' turns Wi-Fi thief to cover tracks
973:"High-tech bugging techniques, and a costly fix"
876:(2nd Edition, published by Thomson, April 2005)
324:
181:Hiding the content or nature of a communication
167:
1015:Open Wi-Fi proves no defence in child porn case
1070:
16:Anonymous communicating between two entities
874:Introduction to Wireless and Mobile Systems
521:
1084:
1077:
1063:
414:
129:that allowed secure communication between
65:Learn how and when to remove this message
844:NSA warrantless surveillance controversy
836:to tap all of its clients' Internet and
800:Comparison of instant messaging clients
301:, programs that identify or neutralize
2005:
495:
423:
1058:
935:The Early History of Voice Encryption
931:
761:
678:– Some instant messaging clients use
625:registration of Internet cafe users.
609:
309:, and web filtering programs such as
1987:
172:
18:
789:Software selections and comparisons
321:rather than secure communications.
273:
13:
912:The schematics are illustrated in
229:Anonymous communication devices –
148:had to discuss vital matters with
14:
2039:
1036:
544:Systems offering partial security
164:. SIGSALY was also never broken.
1986:
1977:
1976:
1042:
477:Methods used to "break" security
393:
23:
896:(2nd Ed, Addison Wesley, 2003)
736:
718:works, but at a higher latency.
660:Programs offering more security
453:Anonymous communication devices
420:of an identity-based network.)
1020:
1008:
994:
983:
965:
925:
906:
886:
866:
826:Electronic Frontier Foundation
824:, a 2006 lawsuit in which the
692:– Some VoIP clients implement
384:Information-theoretic security
1:
872:D. P. Agrawal and Q-A. Zeng,
859:
548:
329:
325:Tools used to obtain security
168:Nature and limits of security
600:
7:
1942:Cryptographic hash function
944:10.1007/978-3-319-53280-6_7
795:Comparison of VoIP software
756:
732:. This is not standardized.
10:
2044:
663:
613:
525:
499:
485:
481:
397:
333:
112:
1972:
1919:
1896:
1880:
1849:
1824:
1764:
1711:
1588:
1499:
1466:
1433:
1380:
1277:
1229:
1176:
1165:
1092:
388:physical layer encryption
1932:Timeline of cryptography
918:and describes "rotating
810:
773:Opportunistic encryption
676:Secure instant messaging
522:Laser audio surveillance
361:Opportunistic encryption
1927:Outline of cryptography
1898:Anti–computer forensics
778:Communications security
488:Covert listening device
415:Identity-based networks
231:unregistered cellphones
1954:Homomorphic encryption
1947:List of hash functions
1086:Cryptographic software
449:networks, and others.
45:by rewriting it in an
1959:End-to-end encryption
932:Bauer, Craig (2017),
700:encryption for calls.
680:end-to-end encryption
518:, which is complex).
409:plausible deniability
150:Franklin D. Roosevelt
127:Madison Square Garden
2028:Espionage techniques
2013:Secure communication
1051:at Wikimedia Commons
1049:Secure communication
822:Hepting vs. AT&T
747:Sky Global / Sky ECC
560:counter-surveillance
78:Secure communication
2018:Secret broadcasting
1003:Harv. JL & Tech
915:U.S. patent 613,809
894:Computer Networking
496:Computers (general)
424:Anonymized networks
386:technique known as
1546:Facebook Messenger
892:J.K. and K. Ross,
762:General background
610:Anonymous Internet
47:encyclopedic style
34:is written like a
2000:
1999:
1850:Service providers
1584:
1583:
1390:Check Point VPN-1
1047:Media related to
953:978-3-319-53278-3
902:978-0-321-17644-8
882:978-0-534-49303-5
849:Secret cell phone
768:Computer security
629:Anonymous proxies
578:Some cellphones (
508:keystroke logging
502:Computer security
350:man in the middle
319:computer security
240:Anonymous proxies
173:Types of security
146:Winston Churchill
106:Trusted Computing
75:
74:
67:
2035:
2023:Internet privacy
1990:
1989:
1980:
1979:
1828:operating system
1826:Security-focused
1774:
1599:
1174:
1173:
1079:
1072:
1065:
1056:
1055:
1046:
1030:
1024:
1018:
1012:
1006:
998:
992:
987:
981:
980:
969:
963:
962:
961:
960:
929:
923:
917:
910:
904:
890:
884:
870:
783:Secure messaging
528:Laser microphone
274:Borderline cases
261:traffic analysis
123:radio controlled
70:
63:
59:
56:
50:
27:
26:
19:
2043:
2042:
2038:
2037:
2036:
2034:
2033:
2032:
2003:
2002:
2001:
1996:
1968:
1915:
1892:
1876:
1845:
1827:
1820:
1768:
1760:
1731:Java Anon Proxy
1707:
1593:
1592:
1590:Disk encryption
1580:
1556:Google Messages
1541:Signal Protocol
1495:
1462:
1429:
1376:
1273:
1225:
1168:
1161:
1088:
1083:
1039:
1034:
1033:
1025:
1021:
1013:
1009:
999:
995:
988:
984:
977:Popular Science
971:
970:
966:
958:
956:
954:
930:
926:
913:
911:
907:
891:
887:
871:
867:
862:
813:
791:
764:
759:
739:
684:forward secrecy
672:
662:
618:
612:
603:
551:
546:
530:
524:
504:
498:
490:
484:
479:
455:
426:
417:
402:
396:
338:
332:
327:
276:
189:semaphore tower
175:
170:
144:. During WWII,
121:demonstrated a
115:
71:
60:
54:
51:
43:help improve it
40:
28:
24:
17:
12:
11:
5:
2041:
2031:
2030:
2025:
2020:
2015:
1998:
1997:
1995:
1994:
1984:
1973:
1970:
1969:
1967:
1966:
1961:
1956:
1951:
1950:
1949:
1944:
1937:Hash functions
1934:
1929:
1923:
1921:
1920:Related topics
1917:
1916:
1914:
1913:
1908:
1902:
1900:
1894:
1893:
1891:
1890:
1884:
1882:
1878:
1877:
1875:
1874:
1869:
1864:
1859:
1853:
1851:
1847:
1846:
1844:
1843:
1838:
1832:
1830:
1822:
1821:
1819:
1818:
1813:
1808:
1803:
1798:
1793:
1788:
1783:
1777:
1775:
1762:
1761:
1759:
1758:
1753:
1748:
1743:
1738:
1733:
1728:
1723:
1717:
1715:
1709:
1708:
1706:
1705:
1700:
1699:
1698:
1688:
1683:
1678:
1673:
1668:
1663:
1658:
1653:
1648:
1643:
1638:
1633:
1628:
1623:
1618:
1613:
1608:
1602:
1600:
1586:
1585:
1582:
1581:
1579:
1578:
1575:
1574:
1573:
1568:
1563:
1558:
1553:
1548:
1538:
1533:
1528:
1527:
1526:
1521:
1511:
1505:
1503:
1497:
1496:
1494:
1493:
1488:
1483:
1478:
1472:
1470:
1464:
1463:
1461:
1460:
1455:
1450:
1445:
1439:
1437:
1431:
1430:
1428:
1427:
1422:
1417:
1412:
1407:
1402:
1397:
1392:
1386:
1384:
1378:
1377:
1375:
1374:
1369:
1364:
1359:
1354:
1349:
1344:
1339:
1334:
1329:
1324:
1319:
1314:
1309:
1304:
1299:
1294:
1289:
1287:BBM Enterprise
1283:
1281:
1275:
1274:
1272:
1271:
1266:
1261:
1256:
1251:
1246:
1241:
1235:
1233:
1227:
1226:
1224:
1223:
1218:
1213:
1208:
1203:
1198:
1193:
1188:
1182:
1180:
1171:
1163:
1162:
1160:
1159:
1154:
1149:
1144:
1139:
1134:
1129:
1119:
1114:
1109:
1104:
1098:
1096:
1090:
1089:
1082:
1081:
1074:
1067:
1059:
1053:
1052:
1038:
1037:External links
1035:
1032:
1031:
1029:, The Register
1019:
1017:, The Register
1007:
993:
982:
979:. August 1987.
964:
952:
924:
905:
885:
864:
863:
861:
858:
857:
856:
851:
846:
841:
840:communications
819:
812:
809:
808:
807:
802:
797:
790:
787:
786:
785:
780:
775:
770:
763:
760:
758:
755:
751:Phantom Secure
738:
735:
734:
733:
719:
701:
687:
661:
658:
614:Main article:
611:
608:
602:
599:
550:
547:
545:
542:
526:Main article:
523:
520:
500:Main article:
497:
494:
486:Main article:
483:
480:
478:
475:
454:
451:
425:
422:
416:
413:
398:Main article:
395:
392:
369:authentication
334:Main article:
331:
328:
326:
323:
275:
272:
267:
266:
265:
264:
257:
251:
250:
249:
244:Hard-to-trace
242:
237:
235:Internet cafes
227:
214:
213:
212:
210:Identity Based
207:
202:
197:
192:
174:
171:
169:
166:
114:
111:
73:
72:
31:
29:
22:
15:
9:
6:
4:
3:
2:
2040:
2029:
2026:
2024:
2021:
2019:
2016:
2014:
2011:
2010:
2008:
1993:
1985:
1983:
1975:
1974:
1971:
1965:
1962:
1960:
1957:
1955:
1952:
1948:
1945:
1943:
1940:
1939:
1938:
1935:
1933:
1930:
1928:
1925:
1924:
1922:
1918:
1912:
1909:
1907:
1904:
1903:
1901:
1899:
1895:
1889:
1886:
1885:
1883:
1879:
1873:
1870:
1868:
1865:
1863:
1860:
1858:
1855:
1854:
1852:
1848:
1842:
1839:
1837:
1834:
1833:
1831:
1829:
1823:
1817:
1814:
1812:
1809:
1807:
1804:
1802:
1799:
1797:
1794:
1792:
1789:
1787:
1784:
1782:
1779:
1778:
1776:
1772:
1767:
1763:
1757:
1754:
1752:
1749:
1747:
1744:
1742:
1739:
1737:
1734:
1732:
1729:
1727:
1724:
1722:
1719:
1718:
1716:
1714:
1710:
1704:
1701:
1697:
1694:
1693:
1692:
1689:
1687:
1684:
1682:
1679:
1677:
1674:
1672:
1669:
1667:
1664:
1662:
1659:
1657:
1654:
1652:
1649:
1647:
1644:
1642:
1639:
1637:
1634:
1632:
1629:
1627:
1624:
1622:
1619:
1617:
1614:
1612:
1609:
1607:
1604:
1603:
1601:
1597:
1591:
1587:
1576:
1572:
1569:
1567:
1564:
1562:
1559:
1557:
1554:
1552:
1549:
1547:
1544:
1543:
1542:
1539:
1537:
1534:
1532:
1529:
1525:
1522:
1520:
1517:
1516:
1515:
1512:
1510:
1507:
1506:
1504:
1502:
1498:
1492:
1489:
1487:
1484:
1482:
1479:
1477:
1474:
1473:
1471:
1469:
1465:
1459:
1456:
1454:
1451:
1449:
1446:
1444:
1441:
1440:
1438:
1436:
1432:
1426:
1423:
1421:
1418:
1416:
1413:
1411:
1410:SoftEther VPN
1408:
1406:
1403:
1401:
1398:
1396:
1393:
1391:
1388:
1387:
1385:
1383:
1379:
1373:
1370:
1368:
1365:
1363:
1360:
1358:
1355:
1353:
1350:
1348:
1345:
1343:
1340:
1338:
1335:
1333:
1330:
1328:
1325:
1323:
1320:
1318:
1315:
1313:
1310:
1308:
1305:
1303:
1300:
1298:
1295:
1293:
1292:Bouncy Castle
1290:
1288:
1285:
1284:
1282:
1280:
1279:TLS & SSL
1276:
1270:
1267:
1265:
1262:
1260:
1257:
1255:
1252:
1250:
1247:
1245:
1242:
1240:
1237:
1236:
1234:
1232:
1228:
1222:
1219:
1217:
1214:
1212:
1209:
1207:
1204:
1202:
1199:
1197:
1194:
1192:
1189:
1187:
1184:
1183:
1181:
1179:
1175:
1172:
1170:
1169:communication
1164:
1158:
1155:
1153:
1150:
1148:
1145:
1143:
1140:
1138:
1135:
1133:
1130:
1127:
1123:
1120:
1118:
1115:
1113:
1110:
1108:
1105:
1103:
1100:
1099:
1097:
1095:
1094:Email clients
1091:
1087:
1080:
1075:
1073:
1068:
1066:
1061:
1060:
1057:
1050:
1045:
1041:
1040:
1028:
1023:
1016:
1011:
1004:
997:
991:
986:
978:
974:
968:
955:
949:
945:
941:
937:
936:
928:
921:
916:
909:
903:
899:
895:
889:
883:
879:
875:
869:
865:
855:
852:
850:
847:
845:
842:
839:
838:Voice over IP
835:
831:
830:AT&T Inc.
827:
823:
820:
818:
815:
814:
806:
805:Anonymous P2P
803:
801:
798:
796:
793:
792:
784:
781:
779:
776:
774:
771:
769:
766:
765:
754:
752:
748:
744:
731:
727:
723:
720:
717:
713:
709:
705:
702:
699:
695:
691:
688:
685:
681:
677:
674:
673:
671:
667:
657:
655:
650:
646:
641:
639:
634:
630:
626:
623:
617:
607:
598:
595:
593:
589:
585:
581:
576:
574:
570:
566:
565:triangulation
561:
557:
541:
539:
535:
529:
519:
517:
513:
509:
503:
493:
489:
474:
472:
471:Internet cafe
468:
464:
460:
450:
448:
447:anonymous P2P
444:
440:
436:
432:
421:
412:
410:
406:
405:Steganography
401:
400:Steganography
394:Steganography
391:
389:
385:
380:
378:
377:eavesdropping
374:
370:
366:
362:
357:
355:
351:
347:
342:
337:
322:
320:
316:
312:
308:
304:
300:
296:
291:
289:
285:
281:
280:trojan horses
271:
263:less reliable
262:
258:
255:
254:
252:
247:
243:
241:
238:
236:
232:
228:
225:
221:
220:
219:
215:
211:
208:
206:
205:Steganography
203:
201:
198:
196:
193:
190:
186:
183:
182:
180:
179:
178:
165:
163:
159:
155:
151:
147:
143:
138:
136:
132:
128:
124:
120:
110:
108:
107:
101:
97:
95:
91:
87:
83:
82:eavesdropping
79:
69:
66:
58:
48:
44:
38:
37:
32:This article
30:
21:
20:
1766:File systems
1676:Private Disk
1166:
1022:
1010:
1002:
996:
985:
976:
967:
957:, retrieved
934:
927:
908:
893:
888:
873:
868:
832:allowed the
740:
737:Criminal use
704:Secure email
642:
627:
619:
604:
596:
577:
573:Faraday cage
552:
531:
505:
491:
456:
427:
418:
403:
381:
358:
339:
292:
277:
268:
176:
162:one-time pad
142:Green Hornet
139:
119:Nikola Tesla
116:
104:
102:
100:technology.
98:
94:surveillance
86:interception
77:
76:
61:
55:January 2015
52:
33:
1881:Educational
1686:Sentry 2020
1631:DriveSentry
1551:Google Allo
1157:Thunderbird
622:third party
538:sound waves
311:Proxomitron
195:Obfuscation
158:white noise
131:transmitter
2007:Categories
1872:NordLocker
1816:Tahoe-LAFS
1806:Rubberhose
1746:RetroShare
1621:Cryptoloop
1616:CrossCrypt
1596:Comparison
1566:TextSecure
1524:ChatSecure
1486:RetroShare
1476:Bitmessage
1415:strongSwan
1201:ChatSecure
1112:Claws Mail
1102:Apple Mail
959:2021-10-23
860:References
664:See also:
549:Cellphones
445:, various
341:Encryption
336:Encryption
330:Encryption
297:software,
286:and other
284:keyloggers
200:Encryption
90:encryption
1713:Anonymity
1703:VeraCrypt
1691:TrueCrypt
1681:Scramdisk
1646:FileVault
1611:BitLocker
1606:BestCrypt
1519:Cryptocat
1425:WireGuard
1327:MatrixSSL
1297:BoringSSL
1259:SecureCRT
1221:Profanity
1196:Centericq
1107:Autocrypt
743:EncroChat
708:Mixminion
654:bandwidth
649:piggyback
633:plaintext
616:Anonymity
601:Landlines
512:backdoors
467:payphones
459:Carnivore
443:Mixminion
373:anonymity
346:backdoors
299:firewalls
295:antivirus
218:anonymity
117:In 1898,
103:Also see
1982:Category
1888:CrypTool
1862:Tresorit
1791:eCryptfs
1751:Ricochet
1651:FreeOTFE
1641:eCryptfs
1626:dm-crypt
1571:WhatsApp
1448:Linphone
1400:Openswan
1367:TeamNote
1352:SChannel
1342:mbed TLS
1322:LibreSSL
1307:cryptlib
1239:Dropbear
1152:Sylpheed
1117:Enigmail
920:coherers
828:alleges
757:See also
712:I2P-Bote
620:Using a
354:key size
135:receiver
125:boat in
1992:Commons
1911:BusKill
1906:USBKill
1857:Freenet
1741:Vidalia
1696:History
1671:PGPDisk
1577:SimpleX
1536:Session
1531:Proteus
1405:OpenVPN
1395:Hamachi
1372:wolfSSL
1362:stunnel
1337:OpenSSL
1269:wolfSSH
1249:OpenSSH
1191:BitlBee
1137:Outlook
1132:Kontact
1126:Gpg4win
817:Freenet
592:Android
569:jamming
563:signal
516:TEMPEST
482:Bugging
473:, etc.
315:Privoxy
307:spyware
288:spyware
246:routing
154:SIGSALY
113:History
41:Please
1964:S/MIME
1811:StegFS
1721:GNUnet
1561:Signal
1509:Matrix
1357:SSLeay
1312:GnuTLS
1264:WinSCP
1216:Kopete
1167:Secure
1005:28(1).
950:
900:
880:
749:, and
668:, and
588:Google
584:iPhone
431:Crowds
365:Navajo
303:adware
224:Crowds
1867:Wuala
1841:Qubes
1836:Tails
1781:EncFS
1756:Wickr
1514:OMEMO
1481:Briar
1458:Zfone
1443:Jitsi
1347:BSAFE
1302:Botan
1254:PuTTY
1211:Jitsi
1206:climm
1186:Adium
854:Unode
811:Other
682:with
645:Wi-Fi
580:Apple
534:laser
463:unzak
1801:PEFS
1796:LUKS
1771:List
1666:LUKS
1661:geli
1656:GBDE
1453:Jami
1435:ZRTP
1420:Tinc
1317:JSSE
948:ISBN
898:ISBN
878:ISBN
710:and
698:SRTP
696:and
694:ZRTP
690:VoIP
556:IMSI
461:and
313:and
305:and
185:Code
133:and
1786:EFS
1736:Tor
1726:I2P
1636:E4M
1501:DRA
1491:Tox
1468:P2P
1382:VPN
1332:NSS
1244:lsh
1231:SSH
1178:OTR
1147:PGP
1142:p≡p
1122:GPG
940:doi
834:NSA
730:TLS
726:SSL
722:IRC
716:Tor
590:'s
582:'s
571:or
439:I2P
435:Tor
382:An
371:or
84:or
2009::
975:.
946:,
922:".
753:.
745:,
656:.
638:IP
586:,
575:.
540:.
510:,
469:,
441:,
437:,
433:,
379:.
290:.
282:,
233:,
137:.
96:.
1773:)
1769:(
1598:)
1594:(
1128:)
1124:(
1078:e
1071:t
1064:v
942::
728:/
554:(
222:"
68:)
62:(
57:)
53:(
49:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.