Researcher develops intelligent encryption libraries

Sometimes, when two people or software applications are communicating via the Internet, a third party is listening. Cryptographic protocols could prevent this situation, but software developers often find it difficult to ...

Novel smart materials inspired by sea creatures

A suite of new materials developed in the lab of UConn researcher Luyi Sun can change their appearance and quickly revert to their original state, just like the squid and jellyfish that inspired them.

How to hide secret messages using fizzy drinks

Next time you see someone spilling a drink in a bar, you could actually be witnessing a spy secretly decoding an encrypted message. This might sound like something from a Bond movie. But a team from Israel has used some rather ...

FBI chief warns of 'costs' to strong encryption

FBI Director James Comey called Tuesday for a discussion of the "costs" of strong encryption now that a legal battle over access to the iPhone used by a California attacker has ended.

Apple denies handing source code over to China

Apple on Tuesday denied providing Chinese authorities with special access to its devices, as the iPhone maker defended its position on encryption and cooperation with US law enforcement.

page 6 from 26