Google+ Encrypted messages explained By Kaye Foley ~ High Tech House Calls
Expert Computer Consulting for Homes and Small Businesses

Let there be hope...

Life has changed there is no doubt and we wanted to reach out to see how you are doing.

As we go through this interesting time, we are trying to look at this as an opportunity to focus on our family and on friends like you. Let us use this extra time to catch up and talk more. Let us cook food that is not fast, but interesting and satisfying. Let us learn to enjoy a time to try new things. Let us find ways to enjoy time at home!

Computer Security

If my client base is any experience, anyone can be a victim of a Ransomware, Malware or Virus attack.

What can you do about it?

I conduct audits of your entire computer infrastructure and apply best practice solutions to plug the security holes on your computers, Smartphones and networks.

Now offering consultations to give you the best protection possible:


404.229.0839
carlthorne@hthcatlanta.com

Jack of All Trades, Master of Many

Jack of All Trades, and Master of Many

We provide technical support for:


Homes and small businesses

Windows and the Mac OS platform

iPhones and Android Smartphones

Wireless and wired networks

New device setup

Old device upgrade or repair

One-on-one training

Remote assistance


How To Stop Malware

Tuesday, November 24, 2015

Encrypted messages explained By Kaye Foley

Terrorists in the modern age have a tool in their arsenal that allows them to operate under the radar: technology.

After a series of unexpected and devastating attacks, counterterrorism officials believe that it’s getting harder to track ISIS because they “go dark” through the use of encryption messaging and apps.

The act of encryption, when a message is encoded so others can’t read it, is centuries old. Think of Egyptians and cryptography or Julius Caesar and the Caesar cipher. But now, the Internet and tech advancements have propelled encryption into the digital age. Most encryption programs transform information into a series of letters and numbers, which can only be opened with a key. One message can have multiple codes, each with a different key, making it a nearly impossible to crack.
We use encryption often in our daily lives when we go online, like when we shop or bank. But databases exist that can be used to really cover a person’s tracks. Software like Tor — originally developed by the U.S. government to protect private intelligence information — uses an anonymous network of servers to create a space on the “dark Web” where people with access are untraceable online.

Encryption apps like Apple’s iMessage, WhatsApp, Signal and Telegram use end-to-end encryption, meaning only the people sending and receiving the messages can see them. Many of these apps have settings that allow messages to disappear after a set time or to prevent messages from being forwarded.

Terror groups have encrypted their information for years, but recently, the technology has become more secure and accessible. Government intelligence agencies want tech companies to leave a flaw, or “back door,” in their programs, so they have a way to decrypt messages if needed. But cybersecurity experts warn against this, saying it leaves the products vulnerable to hackers.  
Even with encrypted communication, law enforcement and intelligence agencies are able gather critical clues and information, but it can be more difficult. So the next time you hear about encrypted messaging apps, at least you can say, “Now I get it.”