Low Tech or Non-Cryptographic Techniques

Purpose: There are options for preserving privacy and security that do not rely upon cryptographic technologies. Rather some people choose a selection of workarounds for communicating sensitive information. Techniques The most well known techniques include: Pseudonyms – a fictitious name used in place of a person’s real name to mask…

Continue reading