Lynette Miles

There are significant challenges in implementation of E2EE protocols, from who handles the security, to ensuring all participants can access the same data. E2E encryption introduced lots of challenges for history snapshots and what it means for Tombstones. Multiple types of encryption: local, using keys, and end to end all have different implementations and implications when using a collaborative app - especially a decentralized one. In this second part of our two part talk, dive...

Lynette Miles

In today’s electronically driven communication world, data security is no small matter. What’s safe? Who do you trust? Who else can access your data, and do you even know who those people or companies are selling it to? A critical part of data security is encryption. It protects everything from our personal information, helping prevent identity theft, financial information like your bank account and credit card from being accessed, to company secrets. According to a...