• Bring your own encryption (BYOE), also known as bring your own key (BYOK), is a cloud computing security model that allows cloud service customers to use...
    4 KB (375 words) - 07:15, 28 June 2024
  • key becomes operational to its elimination. Bring your own encryption (BYOE)—also called bring your own key (BYOK)—refers to a cloud-computing security...
    34 KB (3,512 words) - 23:43, 24 May 2025
  • Bring your own device (BYOD /ˌbiː waɪ oʊ ˈdiː/) (also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own personal...
    30 KB (3,154 words) - 13:03, 15 July 2025
  • store encryption keys. Bring your own encryption refers to a cloud computing security model to help cloud service customers to use their own encryption software...
    8 KB (984 words) - 03:42, 28 May 2025
  • Rich Communication Services (category End-to-end encryption)
    clients to establish E2E encryption. In September 2024, the GSMA announced it was working on bringing interoperable E2E encryption to the Universal Profile...
    106 KB (8,007 words) - 06:33, 19 June 2025
  • Thumbnail for Zoom (software)
    Zoom (software) (category End-to-end encryption)
    announced that end-to-end encryption would now be available as an upgrade for Zoom Phone users. The company also announced bring your own key (BYOK) (for users...
    101 KB (8,694 words) - 23:03, 15 July 2025
  • Thumbnail for Signal (software)
    Signal (software) (category End-to-end encryption)
    Joshua (11 January 2018). "Signal partners with Microsoft to bring end-to-end encryption to Skype". Open Whisper Systems. Archived from the original on...
    140 KB (12,073 words) - 14:31, 16 July 2025
  • Thumbnail for Android 10
    September 5, 2019. Porter, Jon (February 11, 2019). "Google wants to bring encryption to all with Adiantum". The Verge. Archived from the original on September...
    35 KB (2,981 words) - 18:54, 2 July 2025
  • Thumbnail for Facebook Messenger
    Facebook Messenger (category End-to-end encryption)
    standalone apps support using multiple accounts, conversations with end-to-end encryption, and playing games. With a monthly userbase of over 1 billion people it...
    102 KB (6,219 words) - 13:40, 16 July 2025
  • HTTP/2 (section Encryption)
    need for encryption and their providers have no desire to spend additional resources on it. Encryption proponents have stated that this encryption overhead...
    39 KB (3,804 words) - 00:48, 10 July 2025
  • Thumbnail for WhatsApp
    WhatsApp (category End-to-end encryption)
    15, 2021. Khalili, Joel (October 15, 2021). "WhatsApp: New encryption feature protects your chat history from prying eyes". TechRadar. Archived from the...
    213 KB (18,730 words) - 16:19, 16 July 2025
  • Thumbnail for Telegram (software)
    Telegram (software) (category End-to-end encryption)
    Windows, macOS, Linux, and web browsers. Telegram offers end-to-end encryption in voice and video calls, and optionally in private chats if both participants...
    216 KB (19,378 words) - 06:38, 17 July 2025
  • Thumbnail for Moxie Marlinspike
    of Signal Messenger LLC. He is also a co-author of the Signal Protocol encryption used by Signal, WhatsApp, Google Messages, Facebook Messenger, and Skype...
    25 KB (2,144 words) - 09:01, 6 July 2025
  • through a VPN tunnel or over HTTPS. Mobile devices in companies with "bring your own device" (BYOD) policies are often used both personally and professionally...
    7 KB (710 words) - 07:05, 26 January 2025
  • Thumbnail for Online Safety Act 2023
    Online Safety Act 2023 (category Encryption debate)
    Ofcom to break end-to-end encryption would not be used immediately. Nevertheless, the provisions pertaining to end-to-end encryption weakening were not removed...
    36 KB (3,822 words) - 14:37, 15 July 2025
  • breaking encryptions will emerge as well as fatal flaws in older encryption methods. Cloud providers must keep up to date with their encryption as the data...
    53 KB (6,653 words) - 07:07, 25 June 2025
  • Thumbnail for Skype
    stating "highly secure with end-to-end encryption". Security services were invisible to the user, and encryption could not be disabled. Skype claimed to...
    100 KB (9,259 words) - 21:05, 17 July 2025
  • Thumbnail for Fire OS
    disabled encryption in the latest version of Fire OS". The Verge. March 3, 2016. Retrieved March 29, 2016. "Amazon pledges to bring device encryption back...
    23 KB (1,785 words) - 23:30, 15 July 2025
  • OpenVPN (UDP/TCP), IKEv2, and WireGuard (UDP/TCP) protocols with AES-256 encryption. On October 11, 2022, Proton VPN released their Stealth Protocol for Android...
    9 KB (845 words) - 07:40, 15 July 2025
  • implemented into WhatsApp and other applications. TextSecure used end-to-end encryption to secure the transmission of text messages, group messages, attachments...
    41 KB (3,418 words) - 08:24, 25 June 2025
  • IMessage (category End-to-end encryption)
    documents; getting delivery and read statuses (read receipts); and end-to-end encryption so only the sender and recipient can read the messages, and no one else;...
    63 KB (5,718 words) - 03:58, 30 June 2025
  • Thumbnail for BusKill
    Print Your Own USB BusKill Module to Protect Data". Tom's Hardware. Retrieved 2023-05-10. Halfacree, Gareth (May 8, 2024). "Melanie Allen Wants to Bring Dead-Man...
    13 KB (1,042 words) - 19:36, 1 July 2025
  • Snapchat (section Encryption)
    Only". It has also reportedly incorporated limited use of end-to-end encryption, with plans to broaden its use in the future. Snapchat was created by...
    154 KB (13,739 words) - 08:01, 16 June 2025
  • Thumbnail for AirPlay
    implement Apple's DRM encryption, some media, such as iTunes Store's own rights-protected music (Apple's own "FairPlay" encryption), YouTube, and Netflix...
    19 KB (2,000 words) - 22:51, 11 July 2025
  • Thumbnail for Apple Intelligence
    "Compose" and "Describe your change" features. Writing Tools has been replicated by Xiaomi, and an open-source PC program brings similar functionality to...
    44 KB (3,852 words) - 07:56, 14 July 2025
  • Whisper Systems announced a partnership with WhatsApp to provide end-to-end encryption by incorporating the Signal Protocol into each WhatsApp client platform...
    59 KB (4,324 words) - 19:37, 7 July 2025
  • Thumbnail for Zoom Communications
    May 2020, Zoom acquired Keybase, a company specializing in end-to-end encryption. In June 2020, the company hired its first chief diversity officer, Damien...
    58 KB (4,765 words) - 08:08, 23 June 2025
  • and network request monitoring were common. Widevine Cypher used DES-X encryption to prevent these techniques. Widevine Technologies partnered with Bellevue-based...
    28 KB (2,875 words) - 23:08, 15 May 2025
  • Thumbnail for MIFARE
    card standard. It uses AES and DES/Triple-DES encryption standards, as well as an older proprietary encryption algorithm, Crypto-1. According to NXP, 10 billion...
    78 KB (6,989 words) - 19:12, 7 July 2025
  • Thumbnail for Quick Share
    Private Share was a derivative data transfer service which used blockchain encryption, designed for important personal or financial information. Sharing files...
    9 KB (871 words) - 23:02, 15 July 2025