p≡p closes the most threatening attack vectors for you and your company’s email communication, such as: - Attachment based attacks (ransomware, malicious email attachments, etc.) - URL based attacks (credential phishing, formjacking attacks, etc.) - Business Email Compromise (BEC), a social attack during which the attacker falsifies content, for instance bank account numbers on invoices - CEO fraud, another social attack in which the attacker impersonates the CEO
p≡p proposes easy and simple to implement solutions with a low TCO that offer: - No phishing with company email accounts on employees inside the company (eg. CEO fraud) - No phishing attacks on customers via company email accounts - No business email compromise with company email accounts on employees - No access to and no modification of email content by attackers - Guarantee to the client that only the recipient is able to read his or her email - Full GDPR and audit compliance
No pep.security videos yet. You could help us improve this page by suggesting one.
Based on our record, GnuPG seems to be more popular. It has been mentiond 38 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Suppose you get along with GPG (The GNU Privacy Guard, GnuPG) for good privacy, and sometimes want to change the passphrase of its secret key. - Source: dev.to / 8 months ago
GnuPG will do this, but both people need to have it set up properly. Source: 12 months ago
This Docker image is designed to support implementing Github Actions With Python. As of version 4.0.0., it starts with The official python docker image as the base Which is a Debian OS. It specifically uses python:3-slim to keep the image size Down for faster loading of Github Actions that use pyaction. On top of the Base, we've installed curl Gpg, git, and the GitHub CLI. We added curl and gpg because they Are... - Source: dev.to / 12 months ago
Though FWIW my real answer, if you were asking this as a practical question rather than an educational exercise, would be to find some existing standard encryption program and use that. Something like GPG, perhaps, or even the built-in encryption in your computer's filesystem. It's going to be plenty good enough. Source: about 1 year ago
Https://gnupg.org/ maybe? If you want to encrypt stuff in the cloud, storj is good. Source: about 1 year ago
Kleopatra - Kleopatra is a certificate manager and GUI for GnuPG.
VeraCrypt - VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.
PGP Tool - PGPTool allows you to encrypt and decrypt files. It's free and easy to use.
Azure Key Vault - Safeguard cryptographic keys and other secrets used by cloud apps and services with Microsoft Azure Key Vault. Try it now.
GPGTools - Use GPG Suite to encrypt, decrypt, sign and verify files or messages.
OpenSSH - OpenSSH is a free version of the SSH connectivity tools that technical users rely on.