“ Key” in this context is almost synonymous with password, but passwords are only one type of key. In symmetric encryption you both encrypt and decrypt information using the same key. All services recommended on this page are known to have up to date implementation of encryption algorithms. However, if you are using well-established services for which warnings are not found after a quick google search, then you should be fine. So even if a service provide, for example, symmetric encryption, it is possible that it is implemented with an outdated algorithm that is not secure. A typical researcher does not know the details on how they differ, but what a researcher should know is that some of these algorithms are outdated and can easily be hacked.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |