How to Use Guerilla IoT for End-to-end Encrypted Messagingby@richkurtzman
239 reads

How to Use Guerilla IoT for End-to-end Encrypted Messaging

by Rich Kurtzman3mJuly 26th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Encrypted messaging is already a thing, yes, but we’re talking end-to-end encryption. It’s fast-moving, small-scale tech which moves against the orthodox. Big tech companies are using our data, mostly to sell us unneeded things on the internet. But they’ve also collected data figuring out what keeps us on their website for longer.Encrypted messaging apps are even more important if you're fighting against a corrupt government or reporting on one, like a journalist.

People Mentioned

Mention Thumbnail

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - How to Use Guerilla IoT for End-to-end Encrypted Messaging
Rich Kurtzman HackerNoon profile picture
Rich Kurtzman

Rich Kurtzman

@richkurtzman

Born and bred in Colorado, studied at Colorado State University and enjoy the outdoors. Brand communications for Fathym.

Learn More
LEARN MORE ABOUT @RICHKURTZMAN'S
EXPERTISE AND PLACE ON THE INTERNET.

Share Your Thoughts

About Author

Rich Kurtzman HackerNoon profile picture
Rich Kurtzman@richkurtzman
Born and bred in Colorado, studied at Colorado State University and enjoy the outdoors. Brand communications for Fathym.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
L O A D I N G
. . . comments & more!