I’d like to show you a simple way to do encryption and verification that leaves the keys in your hands. These come with the worrying fact that governments can demand they hand over the keys and all of that sensitive information is no longer a secret.Įncrypting your information with the open source GPG tools is simple enough, but verifying an identity (like a github account, twitter account or maybe even a domain) was a little harder. We’ve been encouraged in the corporate and enterprise environment to go with paid-for services that can provide end-to-end solutions to our problems. Maybe you’re sending credentials for a service, maybe the client would like to discuss sensitive company information, maybe you’re about to find out your Secret Santa! There are many reasons why encrypting your email is a good idea, but as developers we have a responsibility to for our clients.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |