Can someone who is a lot more technical explain this simply? What am I and other lay persons to understand from this?
Thanks!
See “Note on Web-based Encryption” on Common Threats - Privacy Guides
Can someone who is a lot more technical explain this simply? What am I and other lay persons to understand from this?
Thanks!
See “Note on Web-based Encryption” on Common Threats - Privacy Guides
| Topic | Replies | Views | Activity | |
|---|---|---|---|---|
| Sharing a new tool I found through reddit: https://dele.to/ | 2 | 453 | August 17, 2025 | |
| Introducing WEBCAT: Web-based Code Assurance and Transparency | Securedrop | 4 | 281 | May 6, 2025 | |
| Web based cryptography is considered harmful | 11 | 1578 | October 17, 2025 | |
| Web-based E2EE question under Service Provider threat model | 0 | 117 | November 22, 2024 | |
| Using AI to audit code and eradicate any weaknesses adversaries could possibly use and keep hidden away? | 0 | 228 | February 20, 2024 |
Massive organizations are monitoring your online activities. Privacy Guides is your central privacy and security resource to protect yourself online.
Privacy Guides is a non-profit, socially motivated website that provides information for protecting your data security and privacy.
We do not make money from recommending certain products, and we do not use affiliate links.