<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 03 Apr 2026 19:43:18 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/encryption/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[COTI  V2 Is Just Getting Started]]></title><description><![CDATA[Hard to believe COTI V2 was launched one year ago and just seems like much longer as so much has been squeezed in over the last 12 months. Announcement after announcement with various partnerships and]]></description><link>http://direct.ecency.com/hive-167922/@cryptoandcoffee/coti-v2-is-just-getting-started-6zt</link><guid isPermaLink="true">http://direct.ecency.com/hive-167922/@cryptoandcoffee/coti-v2-is-just-getting-started-6zt</guid><category><![CDATA[hive-167922]]></category><dc:creator><![CDATA[cryptoandcoffee]]></dc:creator><pubDate>Sun, 22 Mar 2026 20:59:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/pBMyo3B2Sao45kGEB1kRY9cJBFGQnrPp2qChGHkgVjzu1y6XFCd4yc32JkGudbxedbE4pxY1d6QA6btUsKgjReE2g8Nv5qS81eSM3ozAzS3LHkWBkWYcTwG5c36fYvG9kF14TDW4sP3Ey4hXgwdsLqCEWdMiFfjWwFCNpU1Uh1Sk9TUJ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[How to Send Encrypted Email to External Recipients Without Breaking Workflows]]></title><description><![CDATA[Many organizations need to send an encrypted email to outside parties, which breaks the flow of normal communication. Encryption improves confidentiality but introduces friction to upset customers, vendors,]]></description><link>http://direct.ecency.com/encryption/@vilenatom/how-to-send-encrypted-email</link><guid isPermaLink="true">http://direct.ecency.com/encryption/@vilenatom/how-to-send-encrypted-email</guid><category><![CDATA[encryption]]></category><dc:creator><![CDATA[vilenatom]]></dc:creator><pubDate>Sun, 22 Mar 2026 20:22:33 GMT</pubDate></item><item><title><![CDATA[Turing Award Winners]]></title><description><![CDATA[Congrats to Charles Bennett and Gilles Brassard for winning the Turing Award for their industry leadership and breakthroughs with Quantum Information, specifically quantum key distribution. Their work]]></description><link>http://direct.ecency.com/technology/@mrosenquist/turing-award-winners</link><guid isPermaLink="true">http://direct.ecency.com/technology/@mrosenquist/turing-award-winners</guid><category><![CDATA[technology]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Fri, 20 Mar 2026 17:59:24 GMT</pubDate></item><item><title><![CDATA[Stop Using Non-Private USBs]]></title><description><![CDATA[Storing sensitive files on a normal USB drive is like writing your diary on a sticky note and leaving it in a taxi. If someone gets the drive, they get the files with no hacking required. But luckily you]]></description><link>http://direct.ecency.com/data/@skycorridors/stop-using-non-private-usbs</link><guid isPermaLink="true">http://direct.ecency.com/data/@skycorridors/stop-using-non-private-usbs</guid><category><![CDATA[data]]></category><dc:creator><![CDATA[skycorridors]]></dc:creator><pubDate>Fri, 13 Mar 2026 13:18:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e6LWih8y5J8rAZAu3Hvtw8SqtsoESnHSqpz?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Use encrypted cloud storage]]></title><link>http://direct.ecency.com/encryption/@skycorridors/use-encrypted-cloud-storage</link><guid isPermaLink="true">http://direct.ecency.com/encryption/@skycorridors/use-encrypted-cloud-storage</guid><category><![CDATA[encryption]]></category><dc:creator><![CDATA[skycorridors]]></dc:creator><pubDate>Tue, 24 Feb 2026 13:48:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/2dk2RRM2dZ8gPSQXD26P2As77kSkptG6psTeS3u2raTH2hdC8abGqfS1zgXxAWXoenVmXqBVwr7imkRiQNbgU5yamfLqTvz8JzsLCnhujLEBdV2PtjhW7vjHyPdSMT2tokYGPRRQasW7c7uoQmcthFz2BYkLxwLz3tTod4p5ZG?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Use encrypted notes app]]></title><link>http://direct.ecency.com/surveillance/@skycorridors/use-encrypted-notes-app</link><guid isPermaLink="true">http://direct.ecency.com/surveillance/@skycorridors/use-encrypted-notes-app</guid><category><![CDATA[surveillance]]></category><dc:creator><![CDATA[skycorridors]]></dc:creator><pubDate>Mon, 23 Feb 2026 13:57:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/2dk2RRM2dZ8gPSQXD26P2As77kSkptG6psTeS3u2Aroyk1F7gLf89oQGHKEkuuV8xtKAfLLUrYihNnWaWpwXksk4m34pw5gPNPZU832dRwZ9aTwwPwAhpKQ8qBRfkz1a7CjgnFESRfML1hmES1JbdujgyrFyxLV3iLzdBGMCmL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Exploitable Entropy Deficiencies in Hardware Key Generation: Vulnerabilities in Smartphone Encryption Chips and Their Implications for Device Security]]></title><description><![CDATA[Abstract Modern smartphones rely on hardware-backed full-disk encryption (FDE) to protect user data, employing AES-256 with keys derived from hardware security modules (HSMs) in system-on-chip (SoC) designs]]></description><link>http://direct.ecency.com/encryption/@x9ed1732b/exploitable-entropy-deficiencies-in-hardware-key-generation-vulnerabilities-in-smartphone-encryption-chips-and-their-implicatio</link><guid isPermaLink="true">http://direct.ecency.com/encryption/@x9ed1732b/exploitable-entropy-deficiencies-in-hardware-key-generation-vulnerabilities-in-smartphone-encryption-chips-and-their-implicatio</guid><category><![CDATA[encryption]]></category><dc:creator><![CDATA[x9ed1732b]]></dc:creator><pubDate>Sat, 17 Jan 2026 10:45:33 GMT</pubDate></item><item><title><![CDATA[Stop Sending Secrets in Plain Text: A Simple Guide to PGP]]></title><description><![CDATA[PGP for Real Life: Secure Text and Files PGP encryption is a simple, powerful tool that’s often overlooked. It can make your digital life more secure without adding a ton of complexity. Like most skills,]]></description><link>http://direct.ecency.com/hive-133127/@crvne.eth/stop-sending-secrets-in-plain-text-a-simple-guide-to-pgp</link><guid isPermaLink="true">http://direct.ecency.com/hive-133127/@crvne.eth/stop-sending-secrets-in-plain-text-a-simple-guide-to-pgp</guid><category><![CDATA[hive-133127]]></category><dc:creator><![CDATA[crvne.eth]]></dc:creator><pubDate>Thu, 18 Dec 2025 02:03:03 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP35bVGjGoE93K3E4U5KX8KtMBJ2rhrzyKcjwHz5CftTTruXNUKBUkAx5JMYouWrYPaDHKkhwuUhXVujRiSKKeryVR5Jnm2Lskndo8A?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Why I’m A TECHNO OPTIMIST]]></title><link>http://direct.ecency.com/tech/@skycorridors/27bk56-why-i-m-a-techno-optimist</link><guid isPermaLink="true">http://direct.ecency.com/tech/@skycorridors/27bk56-why-i-m-a-techno-optimist</guid><category><![CDATA[tech]]></category><dc:creator><![CDATA[skycorridors]]></dc:creator><pubDate>Sun, 23 Nov 2025 14:06:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45e6GQoMvFSgz6gkU2LE5GHWi4ankSYWT6Szr?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Would A Decentralized Version Of Signal Prevent Future Outages?]]></title><description><![CDATA[Earlier today, the private messenger Signal went down for millions of users as a result of a DNS issue at AWS (Amazon Web Services), highlighting Signal's dependence on third-party servers. In this post,]]></description><link>http://direct.ecency.com/hive-167922/@brennanhm/would-a-decentralized-version-of-signal-prevent-future-outages-5rd</link><guid isPermaLink="true">http://direct.ecency.com/hive-167922/@brennanhm/would-a-decentralized-version-of-signal-prevent-future-outages-5rd</guid><category><![CDATA[hive-167922]]></category><dc:creator><![CDATA[brennanhm]]></dc:creator><pubDate>Tue, 21 Oct 2025 02:17:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pJD9XBvScWccM3MYnVYYNVW9NiwhFnEkcn2vgxndipVxPEU1NHbCkZASHKwTP8PLWGE1RWA12DFEKZeKrnc44kCZrcEP3DtToYMvsGLPCignRU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Defending Enterprise Data Against Quantum Encryption Attacks]]></title><description><![CDATA[The quantum cliff is coming. Q-Day is the point in time when quantum computers become powerful enough to break most data encryption. It is inevitable that legacy algorithms will be undermined and the race]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/defending-enterprise-data-against-quantum-encryption-attacks</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/defending-enterprise-data-against-quantum-encryption-attacks</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 20 Aug 2025 03:26:24 GMT</pubDate></item><item><title><![CDATA[Quantum Cybersecurity Risks]]></title><description><![CDATA[The Cybersecurity Vault — episode 49, with guest Bob Zinga. Bob discusses the impending risks of quantum computing undermining data confidentiality. In this compelling episode, we dive into the challenges]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/quantum-cybersecurity-risks</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/quantum-cybersecurity-risks</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Mon, 11 Aug 2025 00:09:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eAeah9EMG4jScaswdXukuLnLb63u1K6kh7c?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[What Is Email Encryption and How to Do It]]></title><description><![CDATA[Email is now a vital part of both our professional and personal lives. We use it for everything from sharing photos with family to sending confidential business documents. But have you ever thought about]]></description><link>http://direct.ecency.com/encryption/@alex-sway/what-is-email-encryption-and-how-to-do-it</link><guid isPermaLink="true">http://direct.ecency.com/encryption/@alex-sway/what-is-email-encryption-and-how-to-do-it</guid><category><![CDATA[encryption]]></category><dc:creator><![CDATA[alex-sway]]></dc:creator><pubDate>Fri, 08 Aug 2025 12:03:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/2r8F9rTBenJQonvFkRsaKAi9fqQ1Q2oBjHpzftMPNns6fR26XR4ZsuZ4jXoqKra9fnxQvFVgJ8eZULNKP7E96rSY5WWs9jKzQjDFZEXoAraTMLTjYFMAYnW8WCChSekk6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[EU proposal to scan all private messages gains momentum]]></title><description><![CDATA[The European Union's controversial proposal aims to mandate all messaging platforms—including those with end-to-end encryption like WhatsApp, Telegram etc—to scan every private message, photo, and video]]></description><link>http://direct.ecency.com/hive-167922/@justmythoughts/eu-proposal-to-scan-all-private-messages-gains-momentum-abg</link><guid isPermaLink="true">http://direct.ecency.com/hive-167922/@justmythoughts/eu-proposal-to-scan-all-private-messages-gains-momentum-abg</guid><category><![CDATA[hive-167922]]></category><dc:creator><![CDATA[justmythoughts]]></dc:creator><pubDate>Tue, 05 Aug 2025 18:01:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVPgRCnRzbu6rj6tCWHWVCA9ZaKB4ZqmRDA3Q5XUQPjp2WnLsPfPR9MrzoANS3Xx9fMw4Zk6MWdrRVndCQbsmzzPpnNuX5K3NxK6yBvDw3xPuACBxNA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Crypto and the Quantum Threat]]></title><description><![CDATA[There is a lot of attention being given of late to the thread of quantum computing breakthroughs to crypto. This is a bit ironic since, from a security standpoint, quantum computers are a threat to everything.]]></description><link>http://direct.ecency.com/hive-167922/@taskmaster4450/crypto-and-the-quantum-threat-khs</link><guid isPermaLink="true">http://direct.ecency.com/hive-167922/@taskmaster4450/crypto-and-the-quantum-threat-khs</guid><category><![CDATA[hive-167922]]></category><dc:creator><![CDATA[taskmaster4450]]></dc:creator><pubDate>Sat, 02 Aug 2025 15:30:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/62PdCouTvNPDFdqJorCLnfauvZdwTKWtZntNNFnQrgSM9W1BZt51YiKYneFUj55nWfiRHB57QQMEjUJwuFK4rhLoM2SpQ7rknmNptzAE4TgmiDU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[If at first you don't succeed.]]></title><description><![CDATA[AES data encryption was a no go Last time I was getting really frustrated that I just couldn't figure out how to get an encrypted file to be stored on the Hive blockchain. The app got close but just couldn't]]></description><link>http://direct.ecency.com/hive-192111/@gldragon/if-at-first-you-dont-succeed</link><guid isPermaLink="true">http://direct.ecency.com/hive-192111/@gldragon/if-at-first-you-dont-succeed</guid><category><![CDATA[hive-192111]]></category><dc:creator><![CDATA[gldragon]]></dc:creator><pubDate>Sat, 19 Jul 2025 04:38:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/5s4dzRwnVbzGY5ssnCE4wXzkeAEXyVtgk1ApQTwHMTp6y5PvEo1yenn9mGNFoRoJkqoNXitjPB33xcU2VZEiibfZifGbqWsZoVst1HtRSEk9kXLCFrjJzB32GUPFPGahDspNXBNngQJ51rJLv6Ym1JKgXauwDsr88GTrAKg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Why 'Only Terrorists & Child Abusers Oppose Blockchain, Crypto & Encryption']]></title><description><![CDATA[The debate over free speech, encrypted communications and privacy sometimes centres on a single claim: bad actors, like terrorists and child abusers, exploit private spaces, so encryption must be dangerous.]]></description><link>http://direct.ecency.com/hive-168623/@ura-soul/encryption-blockchain-liberation-ureka</link><guid isPermaLink="true">http://direct.ecency.com/hive-168623/@ura-soul/encryption-blockchain-liberation-ureka</guid><category><![CDATA[hive-168623]]></category><dc:creator><![CDATA[ura-soul]]></dc:creator><pubDate>Thu, 05 Jun 2025 16:09:33 GMT</pubDate><enclosure url="https://images.ecency.com/p/PB8ro82ZpZP35bVGjGoE93K3E4U5KX8KtMBJ2ri7Pv8DCVArKBv6vAqmUYqcjsMMjQa9zfbKocwyCAa2fagciER6YWCfdNbWQN6dXSVrkY4BDMcA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[From Platforms to Protocols: Why I'm Back on XMPP]]></title><description><![CDATA[If you'd like to connect with me on XMPP, you're very welcome! I first used it many years ago, and now I've returned to it — and I'm really glad I did. XMPP is a secure and privacy-friendly way to communicate.]]></description><link>http://direct.ecency.com/xmpp/@rubenstorm/from-platforms-to-protocols-why</link><guid isPermaLink="true">http://direct.ecency.com/xmpp/@rubenstorm/from-platforms-to-protocols-why</guid><category><![CDATA[xmpp]]></category><dc:creator><![CDATA[rubenstorm]]></dc:creator><pubDate>Mon, 02 Jun 2025 12:06:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/2FFvzA2zeqoVPgRCnRzbu6rj6tCWHWVCA9ZaKB4Zq3mw5Fg6pPEptGKVZswZFGamjKY6iiWK6J9G48FqeQCybM6zSjQp4Z8MeSWmQvmYejUUQvqPwUwV4LmDrthHY?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Seismic - introducing encryption at the base layer]]></title><description><![CDATA[Source Back when I started in the world of crypto, one thing that bothered me was the sheer amount of different blockchains that existed and continued to be created. In my head, it would be better for]]></description><link>http://direct.ecency.com/hive-167922/@tokenizedsociety/seismic-introducing-encryption-at-the-base-layer-jln</link><guid isPermaLink="true">http://direct.ecency.com/hive-167922/@tokenizedsociety/seismic-introducing-encryption-at-the-base-layer-jln</guid><category><![CDATA[hive-167922]]></category><dc:creator><![CDATA[tokenizedsociety]]></dc:creator><pubDate>Tue, 27 May 2025 22:52:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/8apfgVN5aF56h3pNBgUbKhHWGKKTuYYBrf2KV25gxzEzKaHjDpD9a3xyH6aK3qgt1c4eQfxrAoyCuoKv2tG2KFqGuDXgGk89upFD4yQsP7nU5MvPEqXkLJLKn3E7iPaXk8irbibTNcHwowts1yNmoruA4ef4UgYXFDNVh2z2kfsdyKQnE8KXAjWiGqbBwDMBUr1JiBbgX3uxCgefuG4MbynxcftpQpJcqRm2zmDLXSpXvU2EHXVjdyz2MQeJqR3QTYjNhA6msuSmaYgb8NgwsWXzut8aJKYKPRQxv9otzTYUpKZV4xjuSm1QZDbFazHFBiYrwWnEw26ukQgtdDSFbdrHZ5YMW2FGwBWC75Zd7SFG7xHkT7MSBLBMCzURSASgLYcrsYora5oGPCSZygBAxodG6W23bnMYDJT5RswyT?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[A Quantum of Lies: No, researchers did not break RSA 2048 encryption with Quantum Computers. Here is how they cheated.]]></title><description><![CDATA[Beim Thema Quanten-Computer ist es nicht so einfach Hype von Fakten zu trennen und es gibt noch eine dritte Kategorie, die man auf dem Radar haben muss: Wissenschaftliche Publikationen, die große Durchbrüche]]></description><link>http://direct.ecency.com/hive-163521/@vikisecrets/a-quantum-of-lies-no-researchers-did-not-break-rsa-2048-encryption-with-quantum-computers-here-is-how-they-cheated</link><guid isPermaLink="true">http://direct.ecency.com/hive-163521/@vikisecrets/a-quantum-of-lies-no-researchers-did-not-break-rsa-2048-encryption-with-quantum-computers-here-is-how-they-cheated</guid><category><![CDATA[hive-163521]]></category><dc:creator><![CDATA[vikisecrets]]></dc:creator><pubDate>Wed, 14 May 2025 10:25:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/NTy4GV6ooFRmaCXZ8UYgPhoud1kjiNX8QokLEZtbBKLuLWQ9yt7K3o4XiwVQYc85wQgScYKKUEsCHuWw1svarK3wUcHzkvjot6c5kPriXNpvEvxYPFjEVTEKkpbuXev4GTknWetfDq9pM2na1qpkY4VxLRw99tsFTm8hPQyk?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>