Next up
Authentication & Restricting Access: Strong Passwords & Two-Factor Auth
Continuing in
Maximum Privacy with End-to-End Encryption
This is a preview of subscription content
Your browser needs to be JavaScript capable to view this video
Try reloading this page, or reviewing your browser settings
In Part 4, we discuss specific tools for secure and private email, messaging and file transfers. We also consider several important factors for choosing the right tool and making tradeoffs between security and convenience.
Keywords
- Security
- Privacy
- messaging
- end-to-end encryption
- E2EE
- data mining
- ProtonMail
- Gmail
- Signal
About this video
- Author(s)
- Carey Parker
- First online
- 10 April 2021
- DOI
- https://doi.org/10.1007/978-1-4842-7034-9_4
- Online ISBN
- 978-1-4842-7034-9
- Publisher
- Apress
- Copyright information
- © Carey Parker 2021