Trade In Free Services Products
We have built the first end-to-end encrypted calendar . The calendar encrypts all data, even event attendees are stored encrypted. The calendar is zero-knowledge because even when you get a push notification of…
India Lead News
We have built the first end-to-end encrypted calendar . The calendar encrypts all data, even event attendees are stored encrypted. The calendar is zero-knowledge because even when you get a push notification of…
Privacy and security are becoming more and more popular, which is why more and more services are trying to promote themselves as the new defenders of privacy. However, these claims are…
Symmetric encryption of emails in Tutanota is done semi-automatically. This means that the encryption is automatic, but when you send an email, you have to set a password that the recipient…
When you want to encrypt an email, there are two encryption methods: asymmetric and symmetric: For asymmetric email encryption, both people must use the same method, for example, PGP, S/MIME,…
Consequently US cloud providers do not comply with strict. German privacy protection laws and should not be used by German schools. Two issues were specifically criticiz: US authorities can access…
The Dutch Ministers of Education, Robbert Dijkgraaf and Dennis Wiersma, have just reported in a parliamentary letter that Google’s current services raise many privacy issues. Consequently, the Dutch education sector will…
Screening process is going exactly as it should to achieve crypto resiliency. For example, one of the candidates already ruled out in the NIST process has been shown to be…
This is a good thing: We want researchers find possible weak points to be able to solve them. The more mature these algorithms are, the more confidence we can have…
During the research project that Tutanota ran together with the L3S research institution at the Leibniz University of Hannover, the researchers evaluated all of the NIST Round 2 algorithms for…
European schools can now wait until Big Tech fixes its privacy issues. Or they can start looking for European alternatives. The latter will have a huge positive impact for Europe and Europeans…
Following the invalidation of the Privacy Shield, US cloud services relied on data processing agreements with their European customers. However, this practice is highly questioned among data privacy experts, especially…
Services due to concern or violation of the high European privacy standards defined by the GDPR. According to the Danish data protection authority, Google’s cloud-based Workspace software suite “does not…
With Whitelabel you can activate the Tutanota login on a subdomain of your own website and change the appearance of Tutanota according to your needs (eg corporate identity). Your whitelabel domain…
FediLab is another Mastodon app that allows you to access the Fediverso on mobile. Use UnifiedPush as an alternative to Google Push. FluffyChat is an easy to use decentralized matrix messenger. It…
Unfortunately, FCM automatically includes a tracking code for analytics purposes, so Google can get a lot of information about app users just through push notifications. The good news is that…
Google is the top spy among all the big tech companies. So to protect your privacy as much as possible, you should stop using Google services whenever possible. The hardest part about…
The key with Tutanota is that all data is always encrypted, even when stored locally on the desktop client. The smart search feature creates an encrypted search index that is…
Google Analytics to safeguard privacy are not sufficient. to protect access by US intelligence agencies. After all, if you as an advertiser process personal data with the necessary permission, that…
The new technology without cookies is gaining ground, as it also works without the support of the Google and Apple monopolies. Identity providers record when a person enters a website. This…
Google, in particular, is likely not primarily concerned with data protection, but rather with hobbling its competitors in the personalized ads arena , in order to grab an even bigger share…
Cookies – the annoying banners that almost all websites present to you on your first visit – track you as you browse the web. This profiling is used in the field…
Our World and Data Science With an enormous explosion in data generation in every industry all over the world, and with the urgent demand of skilled professional to work with…
What is Data Science? The wide application of Information Technology and Computer Science has given rise to so many new fields in the corporate sector which have enormous potentials and…
Now, as the century is moving towards the age of Big data, the requirement for storage of data arises. Data storage was a big problem concerning industrial enterprises until a…
Unfortunately, the Queen herself was unable to attend the concert due to health reasons. Still, there was a role for her and a fluffy surprise in the opening of the…
Data science makes use of a scientific approach to gain insight and knowledge out of data. It employs different processes, systems, and algorithms to derive insights out of structured and…
Do not make your video a copy of your vacancy text. We can read them. All information about the number of hours and salary: leave that out. But remember, what…