An email signature to encourage encryption use

A great way to encourage more ubiquitous email encryption is to let people you’re emailing know that you’re equipped to use it, and that they can be too. Some people use PGP signatures for that purpose, but inline signatures┬ácan be off-putting to people who don’t know what they are, and attachments can be similarly confusing. […]

Stanford Cryptography and #CryptoParty

I recently finished the free online Stanford cryptography course offered through Coursera and taught by Dan Boneh. It’s a challenging class, with at least four hours of lectures a week, and it actually took me two attempts to get all the way through it. I’m really glad I did though: cryptography is a tremendously empowering […]

The crypto triple threat club

My written one-to-one communication patterns can be grouped into three major categories: longform, synchronous shortform, and asynchronous shortform. For the most part I use email, IMs, and SMS, respectively, for those purposes. Each of those technologies has its own end-to-end encryption protocol. 1In some cases, more than one. I’m just listing the ones I use. […]