Posts tagged Here’s
Buying a Website? Here's 9 SEO Tools to Assess Its True Value
Search Engine Journal
Fortunately for us, the same tools that we use for SEO can be absolutely invaluable when buying a website. I want to look at some SEO tools, and a few tools that aren't specifically SEO related, that we've found to be extremely helpful in vetting …
View full post on SEO – Google News
It is with a bit of sadness that I have to admit this: the industry of buying and selling websites can be a bit shady. But not all the shadiness comes from people who are trying to scam buyers (although there are too many of those people) – some people selling websites simply don’t know […]
The post Buying a Website? Here’s 9 SEO Tools to Assess Its True Value by @markdaoust appeared first on Search Engine Journal.
View full post on Search Engine Journal
Social signals can enhance your SEO campaign: here's how
Change is imminent online and if you are in the SEO game I'm sure you have seen an article or 5 stating that SEO dead. Rest assured folks. SEO isn't dead, it's evolving. It's estimated that Google changes their search algorithm approximately 500-600 …
Going global with SEO
A Fresh Web Design Indianapolis Launches New Local SEO Services
What You Need to Know About SEO
View full post on SEO – Google News
Microsoft has narrowed a list of candidates to replace CEO Steve Ballmer to “about five people,” Reuters reports.
The list includes Ford CEO Alan Mulally as an external candidate. Internal candidates include former Nokia CEO Stephen Elop, now VP of Microsoft’s devices and services business unit; former Skype CEO Tony Bates, currently executive VP of Microsoft’s business development and evangelism group; and Satya Nadella, executive VP of Microsoft’s cloud and enterprise group.
Mulally has demurred at speculation that he intends to leave Ford and join the Microsoft team. But that doesn’t mean he won’t pack up and move from Michigan to Washington if the price is right.
Elop seems to be the inside favorite for the CEO gig, since he has both prior Microsoft experience and time as the CEO of Nokia, which Microsoft recently bought a big chunk of for $7.2 billion in order to bolster its smartphone and tablet efforts.
Image courtesy of Reuters/Thomas Peter
View full post on ReadWrite
In the world of Bitcoin, the fastest way to get the electronic currency is still face to face. But such meetings can bring serious risks of their own. My own experience went very well, and I was able to learn about some potential red flags when doing in-person Bitcoin transactions.
When I went out to buy Bitcoin in person, I asked my husband to come along for safety. A savvy source urged me to bring pepper spray, too. Others encouraged me not to go at all.
But sitting face to face with Richard Weston, I felt silly about all my precautions. A middle-aged man with a good haircut, a wedding band and a nice watch, his picture could have been next to “trustworthy” in the dictionary. We met outside a trendy restaurant in downtown DC like we were preparing to transact the world’s most yuppie drug deal.
There are several other ways to obtain Bitcoin, such trading for it over the Internet through an exchange. But right now, face-to-face Bitcoin transactions are the fastest way to obtain the currency. There’s no two-week waiting period for your bank account to connect and verify, as there are with Bitcoin exchanges like Coinbase or Mt. Gox.
I found Weston on LocalBitcoins, a Finnish company that connects Bitcoin buyers and sellers around the globe. With buyers in 190 countries and 3,317 cities, it’s the widest reaching peer-to-peer Bitcoin exchange. There are 100+ active sellers in Washington, DC alone. Richard had a “reputation score” of a perfect 100, which certainly endeared me to him.
Buying Bitcoin Face-To-Face
Since it was happy hour at the crowded bar and I wanted to do an interview, Weston suggested we move to the nearby hospital’s quiet cafeteria. (The exchange itself, which takes minutes, could have been done anywhere we could get a smartphone signal.)
“There’s plenty of security inside the hospital, and the transit police are patrolling the Metro station outside,” he said.
The secure location is as much for his own safety as for mine. Local Bitcoin transactions often involve large amounts of cash changing hands in public places, and Bitcoin robberies do occur. While I figured I had more to lose being the one with the cash, I was well-aware of the story one Reddit user wrote about being “robbed blind” by a buyer.
After we sat down in the well-lit hospital cafeteria, Weston told me he’d been conducting Bitcoin transactions in person for over two years with hundreds of people.
“I’ve sold Bitcoin to people of all ages, men and women, people of all races, including Native American,” he said.
Some of those transactions took place online, but many more in person. Weston has many regular buyers, some of whom live off the grid and depend on Bitcoin as their only form of currency. “Libertarians,” he said wryly.
See also: What’s Bitcoin Worth In The Real World?
For my transaction, Weston took out an almost exhausted miniature legal pad, and carefully pens in my first name, the amount of the transaction in dollars ($20), and in Bitcoin (0.11912563).
He obtains the up-to-the-second price of Bitcoin on bitcoin.clarkmoody.com, a tracker that uses data from Mt. Gox. While there’s controversy around this particular Bitcoin exchange, which has twice had assets seized by the Feds, Weston swears by it. It was the first exchange he ever used, from back when he first discovered Bitcoin through a Washington Post article in May, 2011.
“I’ve always been a fan of cryptography,” Weston said. “I saw this article and said, ‘This is the perfect use of public cryptography.’ I spent all weekend studying Bitcoin. That weekend when I tried to buy it, the price was $6. But by the time I got my money into Mt. Gox, it was $15.”
Meanwhile, our in-person transaction was concluded in minutes.
As he looks up the price, I have to be quiet so he can focus. Bitcoin transactions are irreversible. If he sends me too little, he can just send a second transfer to make it up. But if he sends me too much, he can’t just call his credit card company to reverse it. There’d be no way to fix that except for me to give him more cash.
The next step is to confirm my Bitcoin wallet address, a 34-digit gibberish password. I set up my wallet with Blockchain.info at Weston’s recommendation. After he confirms mine, he logs into his own Blockchain wallet with two-step authentication on his smartphone. Finally, Weston inputs the amount of money he wants to send to from his wallet to mine.
I pass the money across the table and watch the bitcoins appear in my wallet in the same instant.
Risks And Benefits
Every week, Weston trades between $0 and $4,000 in Bitcoin. He makes a slight profit on the fee, but certainly not enough to quit his job. (Disclosure: Since I bought a very small amount of Bitcoin, Weston waived his usual fee for me.)
Most transactions go smoothly, but not all of them. Weston estimates he’s lost $1,000 due to scams. Once a client sent him counterfeit money through the mail. Another time a bank error on the customer’s part resulted in the Bitcoin buyer never paying Richard back.
But he takes it in stride. “Anybody in this exchange business has been scammed once or twice.”
However, face-to-face exchanges become riskier the more popular Bitcoin becomes. In the early days, Richard used to invite people to his house to conduct transactions. Today, people are warier, “they worry they’ll get mugged when they walk in the door.” So instead he picks neutral, high-traffic spaces like the hospital cafeteria.
And as the price as Bitcoin has risen, Weston has stopped trading the actual, physical Bitcoins. They’re worth way too much now to be carrying around. Plus, setting up a Bitcoin wallet takes a minimum amount of knowledge about crypto-currency, ensuring customers have done some research on their own first. “I don’t want to spoon-feed people,” he said.
He also limits seedy transactions by refusing to interact with anyone he suspects of using Bitcoin for illegal activities, like buying drugs on the former black market site Silk Road.
“If somebody approaches me and says, ‘I need $300 for Silk Road,’ I tell them, ‘Sorry, go find somebody else,’” Weston said. In one instance, he couldn’t prove the buyer was going to buy drugs, but since he gave Weston a bad vibe he decided not to do business with him on that feeling alone.
If it’s not very profitable and it’s not always safe, why do it? For Weston, who is the co-organizer of the DC Bitcoin Users’ Group, the appeal is in initiating newbies into the world of Bitcoin. He’s currently seeing a spike in new users post-Silk Road, probably due to Bitcoin’s latest publicity spike. He’s certainly seen a lot of new faces at the DC Bitcoin Users’ Group.
“The membership probably has a mathematical correlation between the number of attendees and the price of Bitcoin,” he said with a laugh.
Weston deals with a lot of Bitcoin newbies, so he tends to hear the same questions over and over. How do I get Bitcoin? What do I buy with it? Where do I store them? And, from entrepreneurs, How do I use it in my business?
Either way, he’s used to interviews like mine. Not just from reporters, (he’s already spoken to Al Jazeera and NBC local, as well as a handful of DC’s omnipresent political bloggers), but from curious new users.
“Sometimes I talk longer to the customer than I’m talking to you,” Weston said after an hour. “I want them to be more comfortable and to understand Bitcoin.”
In fact, he’s grateful for the opportunity to clear up some common misconceptions.
“People don’t understand the reason Bitcoin was invented. It was not designed to be anonymous. It was not designed for Silk Road,” he said. “It allows two people to transact across a distance relatively free of fraud and censorship without a third party you may or may not trust.”
For Weston that means donating to causes he cares about, like Wikileaks, without worrying about any entity weighing in on whether he has the right to do so. To him, Bitcoin isn’t a wealth scheme, it’s a “revolutionary new nature” in the way we spend.
“Is it going to take over cash?” Weston asked me. “No. Is it going to replace gold? No. But it’s definitely going to find a niche.”
Photo via btckeychain
View full post on ReadWrite
This SMX Social Media Marketing preview was authored by Chris Sherman, VP of Event programming. It provides insight on how the people who created the conference program are thinking about social media marketing. Engaging with customers and prospects via social media channels is now an integral,…
Please visit Search Engine Land for the full article.
Learning to code is all the rage these days, but not in one place that matters a lot: U.S. schools.
U.S. students already significantly lag their global counterparts where math and science skills are concerned. But computer science is in even worse shape: Of 12 technical subject examined in a recent study by the National Center for Education Statistics, computer science was the only one that declined in student popularity from 1990 to 2009 (p. 49).
Last year, just 1.4 percent of high school AP students took the computer science exam, compared to almost 40 percent that took exams in English. Far more students took AP exams in Spanish language, psychology, calculus, and history than in programming.
Insufficiencies in school can translate into a bigger problem on an economic level. Each year, U.S. companies need to fill almost 150,000 jobs related to computer science and mathematics, but colleges and universities only graduate about 100,000 students with degrees in those fields.
Bridging The Gap
Recognizing the need for an increased focus in computer science courses in schools, organizations like the nonprofit Code.org are teaming up with industry leaders to promote technology education in both elementary and high schools across the country.
Code.org believes all students in America should have the opportunity to learn computer science, and recently announced the first step in its plan to educate them. The Hour of Code initiative is a one-hour introduction to computer science, designed to help kids and educators understand coding. The organization will provide both online and “unplugged,” or paper, tutorials and materials designed to assist teachers with the education process.
“Bringing computer science to every kid is the gift the tech industry needs to give back to America,” Code.org cofounder Hadi Partove said during the Hour of Code launch event on Monday.
The Hour of Code will take place during Computer Science Education Week, December 9-15, and will encourage teachers to include one hour of computer science in that week’s curriculum. The organization is using game-like tutorials including Angry Birds and Plants vs. Zombies to drum up excitement for coding in the classroom.
Code.org is supported by leaders in technology and education including Bill Gates, Mark Zuckerberg, former president Bill Clinton, NBA star Chris Bosh, and actor Ashton Kutcher.
Paypal cofounder Max Levchin said that teaching young students how to code is critical for maintaining economic competitiveness in the 21st century.
“I think learning how to code, learning how the vast majority of everything around them works, literally, that is to say Internet of Things, and many other trends like it,” he said. “Having that knowledge will prepare children in the generations to come to participate in the economic development of the world.”
A Prep School Shows The Way
To meet the growing need for computer science literate individuals, Beaver Day Country School, an independent college prep middle and high school just outside Boston, now requires students to have coding experience in order to graduate. Rather than requiring students take a standalone coding course to graduate, Beaver’s educators are incorporating coding practices into classes like math, science and even English.
“We also recognize that coding is a mindset, so we don’t want our students to memorize a certain list of commands within a certain programming language,” said Rob MacDonald, the school’s math department head. ”Instead, we want them to think about solving problems in innovative ways.”
Learning programming and computer science builds problem-solving skills and critical thinking that can inform other walks of life.
“We’re also planning an interdisciplinary project in which students will learn about the history of surveillance, including the recent controversies around the NSA and Wikileaks,” MacDonald said. “That project will incorporate history, English and math, and teachers from all three departments will work together on the curriculum.”
Beaver has witnessed the success of coding firsthand. Last fall, a group of students from the Beaver InvenTeam received a $10,000 grant from the Lemelson-MIT program to build “an automated robot vehicular independence system,” or a robot that can follow motion sensors while carrying up to 50 pounds of weight. The school will begin implementing the coding classes for upperclassmen, but will expand all the way down to sixth-graders in the future.
Of course, Beaver Day’s approach isn’t for everyone—tuition for the 2013-2014 school year is $39,950, and the school enrolls a total of 457 students—but it’s definitely an intriguing model.
A Teaching Shortage
While the idea of mandating computer science classes on the path to graduation is an impressive notion, many schools and organizations are finding it challenging to educate and keep teachers who develop technical skills. “I can say pretty confidently there are multiple challenges, but the biggest by far is the lack of teachers,” Code.org’s Partove said.
To make up that shortage, many students turn to mentors or peers outside the classroom to assist with projects like building websites or mobile applications.
See also: How Developers Really Spend Their Time
“I know some students that say, ‘I would have loved to learn more about technology, but my friends, teachers or parents didn’t know much about it’,” said Edward Jiang, CEO and founder of StudentRND. “Building an app was far off magic that no one understood.”
Jiang started StudentRND, an organization that inspires the next generation of technologists and encourages people to work on projects in their free time, after teaching himself how to build websites and online games in high school.
He noticed that many students don’t have the time or the place to explore topics like programming. So he created Code Day, a 24-hour event that brings together high school and college students to build projects.
Because of his program and others like it, students get the opportunity to connect with peers and mentors that share their passion for computer science and can build and develop projects they would have struggled with pursuing on their own.
StudentRND and Code.org both recognize the importance of qualified mentors as an impetus for students to pursue interests in computer science.
“My first exposure to code and programming was actually in a neighborhood workshop,” said Levchin, who grew up in the Soviet Union. “But it’s remarkable that a backwards country like the Soviet Union had [resources for] learning how to code. And industry people, and software developers from the defense program that were teaching kids how to code.”
By 2020, computer-related employment is expected to rise by 22 percent. That means students must be ready to enter a workforce that expects them to have polished technological skills.
Lead image via HackNY on Flickr, other media via Code.org
View full post on ReadWrite
It’s not uncommon to hear marketers complain that “AdWords doesn’t work.” Sometimes you’ll hear this from major enterprises that should know better (looking at you, eBay). We also hear it a lot from smaller businesses – they want to make AdWords work for them, but they haven’t figured it out yet, and they’re about to […]
The post Think AdWords Doesn’t Work? Here’s What You’re Doing Wrong by @LarryKim appeared first on Search Engine Journal.
View full post on Search Engine Journal
So you’re a Downton Abbey addict. I can understand. I am, too. Given that Season 4 just premiered to 9.5 million U.K. viewers, you have two options. One of them will make you immensely happy but an evil criminal. The other will make you a sanctimonious, law-abiding citizen who will be Downton Abbey-free until January 2014.
I know which one I’m choosing.
There are ways—some easy, some hard—to watch British broadcasts from the U.S., but the real question is why we’re being made to wait at all.
Yes, I’m A Criminal
If you live in the U.K. and pay your TV tax, you can watch ITV and BBC programming for free. If you live in the U.S., you can watch many of the same programs for free, but on a time-delayed basis. In the case of Downton Abbey, millions of Britons happily watched it last week. Millions of Americans arguably would have been happy to pay to watch it with them, but were blocked by broadcast rights and some television exec’s decision as to how best to monetize Downton Abbey.
Except that this isn’t really about monetization. They’re giving the show away free to PBS viewers. They’re just making us wait six months to get it.
Six months… of all those Brits gleefully filling Facebook and Twitter with talk of Mary’s baby, Lord Grantham, etc. I’m not going to wait. Neither is Laura Stampler of Time. Or a host of mommy blogs (here and here).
Can’t Wait? You Needn’t
I’ll let the blogs above tell you how to set up a VPN to spoof a U.K. IP address. Or you can simply use Get iPlayer Automator to download the video files each week after the program airs in the U.K. No, you won’t be watching it live, and you’ll have to watch it on your computer unless you move the show to your tablet or phone. You could also use your TV if you’re using AppleTV, Roku or something similar.
But you’ll be watching it. And perhaps you’ll then discover all those other BBC and ITV shows friends have raved about.
The irony is that I have bought every season, even after watching it before the rest of my American friends. It’s not about getting the show for free. It’s about getting it when my friends in the U.K. do. Given the special relationship that supposedly exists between the two countries, it seems it’s the least ITV could do to make Downton Abbey available to me without stooping to such dastardly tactics.
Alas! No. So I’ll download it now, watch it now, and pay for it the second they let me.
View full post on ReadWrite
We’ve grown inured to news about cyberthreats and electronic intrusions. But Edward Snowden has done more to disrupt our assumptions about online privacy and security in the past couple of months than any number of headlines about hackers.
The former National Security Agency contractor, now reportedly living under the radar in Russia, has released incredibly eye-opening documents to the media that seem to demonstrate a deliberate and systematic effort by U.S. and U.K. intelligence services to undermine the most basic safeguards private citizens and corporations use to protect their data.
Those safeguards are known as encryption, a tool Snowden himself has said that is key to online security.
Here’s why encryption matters, how it’s facing more threats than ever, and what we can do about it.
Unsafe At Any Computing Speed
The most recent set of documents, now being released piecemeal by Snowden’s media contacts across the world, seem to indicate that the U.S.’s NSA has somehow managed to render encryption, a tool used to obfuscate data and text, completely worthless.
But it turns out that while the NSA may have compromised some specific technical standards for encryption, the larger notion of encryption, properly implemented, remains valid.
To get a sense of how encryption works, it helps to actually see what encrypted text looks like. The following text, for instance, was encrypted using Text Mechanic, a Web-based tool which uses the Tiny Encryption Algorithm and Base64, a scheme for encoding letters and numbers. It looks pretty strange, but if you use the password provided at the end of this article, then you can translate this back into English words at Text Mechanic.
This may seem like incomprehensible gibberish. And yet, because of the way I’ve encoded it, you could break it, given enough time or computing power or trickery. (The easiest way would be to get me to give away the password.)
In this example, I used symmetric key encryption, where the same encryption key or password is used to both encode and decode data.
Using symmetric encryption, some string of data—a short text message or an entire data file—runs though an encryption program like the one used at Text Mechanic. You can provide the password yourself, or have the encryption program provide the password or key. Sometimes the key can even take the form of a separate data file itself.
When the encrypted file is given to a recipient, they can use the encryption key to “unlock” the encoded document and decrypt it into plain text or a readable file. But this exposes a security flaw in this method: Somehow or other, the encryption key has to be delivered to the recipient, too—otherwise the encrypted data will stay encrypted. A password sent as plain text is an inherent risk: If it’s intercepted, the encrypted communications become fair game.
You could encrypt the password with another password and send the result—but then that password becomes the weak point.
Keeping Secrets By Going Public
To plug this security hole, most secure online transactions now use a variant of what is known as asymmetric encryption or public-key encryption. Public-key encryption uses two keys for locking and opening up data: a public key that is shared with anyone, and a private key that stays with the sender of encrypted data.
To illustrate the mechanics of asymmetric encryption, we’ll use two classic celebrities from the land of cryptography, Alice and Bob. Alice and Bob have been used to explain how secure communications work since the introduction of public-key cryptography in 1978. (The pair, it should be noted, are a rather rambunctious couple, with a host of supporting characters, such as Eve, the eavesdropper, and Victor, the validator.)
In an asymmetric transaction, Alice asks Bob to send his public key to her through an email. In the world of encryption, email is considered unsafe—it can be intercepted and read. Bob can use email because he is just sending Alice his public key. His private key he keeps very much to himself.
After Alice gets Bob’s public key, she uses it to encrypt the file she plans to send Bob. Once she sends it, he can then decrypt the file with his private key to read it.
If the passing of data is reversed, then Bob will need to get Alice’s public key before he can send encrypted files or messages to her.
The immedate benefit of public-key encryption is readily apparent: Neither Alice nor Bob ever sent their highly secret private keys in the clear. Only the public keys—the ones used to encrypt data—are out in the open. And the public key can’t be analyzed to find out the private key.
If Eve, she who eavesdrops, intercepts the messages, she can’t decrypt them, since she doesn’t have Alice’s or Bob’s private keys.
If Bob somehow let Eve get ahold of his private key, then Eve would be able to read Alice’s messages and sent data to Bob, with predictably bad results. But Eve would only see one side of this conversation, because she would also need Alice’s private key to see what Bob had sent to Alice.
The Security Of The Bazaar
When you buy something on the Internet, or conduct banking transactions on a financial website, encryption is very much involved. At least, it had better be.
You can see whether you are using secure encrypted communications within your browser, typically by the presence of a padlock icon in the URL bar and “https://” in the very first part of the website’s address. The “s” stands for secure, and if you don’t see that one little letter on a site with which you are about to conduct a financial transaction, stop what you are doing: Your financial information, including your banking or credit card data, is at risk of being intercepted.
When encryption was initially used for online, browser-based transactions, it used the SSL (Secure Sockets Layer) protocol. These days, that technology has largely been replaced by the Transport Layer Security (TLS) protocol, which is regarded as more secure.
TLS uses a combination of asymmetric and symmetric key methods, as did SSL before it, to complete an e-commerce transaction. When Alice wants to buy Bob something on a website—let’s call this fictional site “Danube”—she will visit the site, find the item she wants to buy, and start the transaction. Her browser will request a secure page from Danube’s Web server—she can tell by the “https://” string in the Web address.
The Danube server sends Alice’s browser its public key, as well as a certificate. Certificates are issued by trusted vendors known as certificate authorities. Certificates are there to ensure that the site being visited is indeed the site you intended to conduct the financial transaction. It ensures to Alice that the site she is visiting is really Danube’s online store, and not some spoofed copy designed to look like it.
Once Alice’s browser has confirmed the authenticity of the site, it uses Danube’s public key to encrypt a random key of its own. This is an old-fashioned symmetric key, the kind that’s vulnerable to interception, but it’s protected by an asymmetric, public key. This key is sent to the Danube server, along with other data from the browser that is also encrypted using the symmetric key.
When the Danube server receives the information from the browser, the next thing it does is decrypt the encrypted symmetric key using its private key. Once the symmetric key is released, that key is in turn used to decrypt the other data the browser sent along.
At this point, both Alice’s browser and the Danube server have a copy of the symmetric key that Alice’s browser created and will continue to use that key to encrypt all of the remaining data passed back and forth between Alice and Danube until the transaction is completed.
The Keys To The Solution
Even though the both symmetric and asymmetric encryption use keys to encrypt and decrypt data, they each use different methods to generate those keys. Key generation is very important, because keys need to be truly random, in order to make sure no machine can easily figure out what the key is through mathematical guesswork.
Symmetric encryption breaks data into smaller blocks in a method called block ciphering. Block ciphering moves letters in the data, converts information within a block into numbers, compresses and expands the data, and runs those numbers through mathematical formulas, which include the key.
A public-key encryption algorithm takes an approach that uses a hash value to encrypt data. With hash values, the data is treated as one big number, which is multiplied by another very large number, with the remainder calculated after dividing the data with a third very large number. That remainder is converted to text.
This would be nearly impossible to reverse engineer, because without knowing any of the factors in the formula—the original number being multiplied (which represents the actual data), the multiplier or the denominator—there is virtually no chance that you’re going to get the algorithm. These aren’t small numbers, either: Hash values worth anything these days are 128 bits long, which gives 3.4 trillion billion billion billion combinations. And there are far more secure hashing algorithms out there, that use 192- or 256-bit values in their algorithms.
Strong Vs. Weak
The recent news that the U.S. National Security Agency has figured out how to get around encryption might lead you to wonder if the secretive agency has managed to build computers powerful enough to brute-force their way through any known encryption algorithm.
Actually, that’s not the case.
Instead, the NSA is using other ways to render encryption moot, not actually breaking it wholesale. For instance, if an intelligence agency were to obtain the private encryption keys used by an Internet service provider and its users, then they could decrypt user data with ease.
Or, as recent revelations show, the NSA could work with commercial security software vendors to weaken known encryption algorithms in ways the NSA can later take advantage of. The danger here is that bad guys might figure out how to take advantage of the same vulnerabilities—a risk that has attracted strong criticism for the NSA.
On top of that, there are still some weak encryption algorithms out there that the NSA—and nearly anyone else with enough time and computers on their hands—can smash thorough with brute force.
Open-source encryption software is regarded as a more secure, because the code that generates the hash values and ciphers can be examined for any evidence of sneakiness and back doors.
Start With The End Points
At the end of the day, however, what law enforcement and intelligence agencies want, they can get. All the encryption in the world does not make a lick of difference if your computer has been compromised and data and messages can be examined right off your hard drive or your cloud-storage account before they are encrypted. Weak passwords, social engineering, and downloadable malware are all easy ways for anyone to get to your system and its data—far simpler than tinkering with encryption.
This is what security experts warn about when they speak of “end-point security vulnerabilities”. End points, in security jargon, mean the devices you actually use—computers, tablets, smartphones, and servers in data centers where your files are stored.
The good news, if there is any, is that encryption itself, when strong enough, still works and can even keep the NSA at bay. Then you’re left with an even more complex task: keeping all the machines you use to connect to the Internet secure.
View full post on ReadWrite