Innovative E-Signature and Email Encryption Services

February 13, 2020 / in Blog, Tech Essentials / by Zafar Khan, RPost CEO

Iowa’s Shadowy Results (You Get What You Pay for with Tech) The ‘results’ from the Iowa caucuses provided a teachable moment for anyone who uses technology, which is to say everyone who reads this article. In case you missed it, the final tally from the Iowa caucuses came 6 days after voting began, and there are still controversies about the results. This deprived any potential winner from a momentum surge. More importantly, it undermines faith in the democratic [...]

Of Course, Alexa has Control of Your House

May 28, 2018 / in Blog, General / by Zafar Khan, RPost CEO

Recent reports of the amazing eavesdropping power and home control Amazon’s Alexa has (similar to other voice-assistances) should not surprise. Its inherent in how these virtual assistants work. Alexa has to always be listening to be able to respond to a voice command that may come from you yelling across the kitchen. She has to be ready to respond to back-and-forth question-response to receive further clarifying instructions if needed, so she often may keep listening in case [...]

Install the Simplest to Use Security Tool, RMail, with its Email Encryption

January 08, 2018 / in Blog, Encryption/Security / by Zafar Khan, RPost CEO

James Bond Enters Cyber Security Enter 2018. A new generation of cyber security risks bear names that make it sound like they were implanted by James Bond villains (“Spectre”), with worldwide doomsday impact (“Meltdown”), coupled with anti-virus programs used for international espionage (Kapersky Labs allegations). In short, “Meltdown” basically melts security boundaries which are normally enforced by computer hardware. “Spectre” is based on the root, [...]

Email Carries the Power of Paper

November 08, 2010 / in Blog, General / by Zafar Khan, RPost CEO

The following article, “Email Carries the Power of Paper” is useful to demonstrate that text typed in email may carry the same weight as text memorialized in paper documents. However, one should consider that if one is to rely on email records, they should ensure that the integrity of the content of those records and the time of delivery cannot be successfully challenged. To shirk responsibility, it is all too easy to deny receipt or challenge the validi [...]