<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Encryption on System Overlord</title><link>https://systemoverlord.com/tags/encryption.html</link><description>Recent content in Encryption on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Sun, 05 Jul 2020 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/encryption/index.xml" rel="self" type="application/rss+xml"/><item><title>Security 101: Encryption, Hashing, and Encoding</title><link>https://systemoverlord.com/2020/07/05/security-101-encryption-hashing-and-encoding.html</link><pubDate>Sun, 05 Jul 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/07/05/security-101-encryption-hashing-and-encoding.html</guid><description>&lt;p&gt;Encryption, Hashing, and Encoding are commonly confused topics by those new to
the information security field. I see these confused even by experienced
software engineers, by developers, and by new hackers. It&amp;rsquo;s really important to
understand the differences &amp;ndash; not just for semantics, but because the actual
uses of them are vastly different.&lt;/p&gt;
&lt;p&gt;I do not claim to be the first to try to clarify this distinction, but there&amp;rsquo;s
still a lack of clarity, and I wanted to include some exercises for you to give
a try. I&amp;rsquo;m a very hands-on person myself, so I&amp;rsquo;m hoping the hands-on examples
are useful.&lt;/p&gt;</description></item><item><title>Stop EARN IT and LAED</title><link>https://systemoverlord.com/2020/06/25/stop-earn-it-and-laed.html</link><pubDate>Thu, 25 Jun 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/06/25/stop-earn-it-and-laed.html</guid><description>&lt;p&gt;Unless you&amp;rsquo;ve been living under a rock, you know that the Crypto Wars are back.
Politicians, seemingly led by Senator Lindsey Graham of South Carolina, seem
bound and determined to undermine user&amp;rsquo;s privacy and security online to
strengthen the power of the police state. It will have disproportionate affects
on the innocent rather than criminals and will raise operating costs and make it
much harder for small businesses and startups to compete in the US.&lt;/p&gt;</description></item></channel></rss>