CELLCRYPTAug 25, 2023Cryptography: Hardware VS SoftwareIn today's digitized age, securing our mobile communications is paramount. With threats from hackers, malware, and other cyber...
CELLCRYPTNov 11, 2022What are Key Fingerprints and how do they work?As experts in encrypted communications, technical details are our daily bread and butter. However, we understand that not everyone is...
CELLCRYPTNov 4, 2022SecurityThe Risks of Using Telephone Numbers as your ID with Signal and WhatsApp.When you installed Cellcrypt, you may have noticed that we asked for your email address rather than your telephone number. There are...
CELLCRYPTJun 2, 2021SecurityDemystifying Access Control and Zero-TrustAs agencies rethink making temporary remote arrangements permanent, officials should start with proven ubiquitous encryption technology....