Why protect sensitive data ? |
Today, with the highly increasing intelligence budgets and technology, hackers and intelligence services have tools which allow them to tap the Internet selectively for strategic, competitive and confidential information. Some well known examples from the intelligence services include Echelon, Carnivore, Magic Lantern and Tias among others. You will find a short description of each and some interesting links below:
These are only some of the publicly known projects, while a lot of others are kept secret. Quite a lot of hacker tools are also available (they are not listed here for obvious reasons). But you can search google on "internet hacking tools" to get an idea on the variety of tools available. Also, concerning the most commonly used (and favored by the US government) encryption algorithms, there is a lot of doubt on their robustness:
A better algorithm, known for the past 10 years, and still reputed for its robustness and security is IDEA™, the International Data Encryption Algorithm:
Most encryption and VPN devices on the market do not provide an adequate level of protection, only using DES and triple-DES. Lightning uses state of the art technology, and gives the choice of the encryption algorithms to the user. The standard ones include IDEA, CAST, Blowfish, Twofish, AES, DES and 3DES to provide the needed level of transmission security for the user's (and his clients') sensitive and valuable data. You may now wish to know more about
|
< Prev | Next > |
---|