Search Details

Word: encrypted (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Being nerds, however, they are rather unworldly. They are similar in dress, zip code, outlook and philosophy to the Berkeley free-speech activists of the early 1960s, except that the cypherpunks have a bigger megaphone: the Internet. They can encrypt free speech and software as well, so various uptight authority figures cannot stop their heroic data...

Author: /time Magazine | Title: Will Cyber Criminals Run The World? | 6/19/2000 | See Source »

...VMAIL $20 Kids record a voice message, encrypt it with a secret code, then send it to a friend using the built-in radio technology...

Author: /time Magazine | Title: Wireless Summer | 5/29/2000 | See Source »

...says Caroline Martin, an e-commerce analyst in the London office of Datamonitor. So-called SIM cards are already present in all European mobile phones to identify users for billing purposes. Once new phones with wireless Internet access come on the market, these smart cards will be used to encrypt a consumer's credit details and send them securely to merchants over the Internet...

Author: /time Magazine | Title: Europe Closes the Gap | 3/13/2000 | See Source »

...Britain. It concludes that U.S. intelligence officials colluded with top American tech firms, including Microsoft and IBM, in operating the system and sifting through the vast amount of information it intercepts daily. Upon hearing the E.C. report, French justice minister Elisabeth Guigou complained vociferously, encouraging French businesses to encrypt any sensitive information transmitted over phone lines or satellites...

Author: /time Magazine | Title: Why Eye in the Sky Is a Tempest in a Teacup | 2/24/2000 | See Source »

...second possibility is to implement softwaremaking "encrypted networking" possible. Thissoftware would encrypt all information passingbetween a user's computer and the network. Thesoftware is expensive, however, and may be subjectto government regulations...

Author: By Robert K. Silverman, CONTRIBUTING WRITER | Title: Internet Hacker Breaks Into Eliot House Network | 10/7/1998 | See Source »

Previous | 1 | 2 | 3 | 4 | 5 | 6 | Next