Encrypt Your Email, Keep the Data Private

February 24, 2020 / in Blog, General / by Zafar Khan, RPost CEO

Have No Fear, High Tech Quarantines are Here! If you are stuck on a cruise ship in the South China Sea, it might be a good time to fear the new coronavirus. But if you are living in a modern city, have no fear. High tech quarantines are here. Your government can impose (and enforce) quarantines on those who they think may be infected—and by remote control no less. If you sneeze too often with Alexa listening or Ring sees that you look a little feverish when you a [...]

Email Encryption Technology that Protects

July 04, 2019 / in Blog, Tech Essentials / by Zafar Khan, RPost CEO

Independence Day – The Good Old Days When Only the NSA Read your Email This time of year, we usually find ourselves reflecting on the great freedoms we enjoy as Americans, thanks to the bravery of our founding fathers and the militia men and women of that era. Several years ago, we reported an analysis of the alleged revelations made public by NSA whistleblower Edward Snowden, as a foreshadow of a rising threat to the Constitution which was put in place to protect t [...]

Tech Trends to Expect in 2017 – Part 2 of 3

January 12, 2017 / in Blog, General / by Zafar Khan, RPost CEO

Each year, technological advancements make our lives easier, more productive, and more enjoyable. Last week, we made the first of three weekly predictions on technology trends we think will manifest in 2017. Here’s our second prediction:Prediction 2: Balance Tips Towards Convenience and [...]

Beware What’s Under Your Christmas Tree

December 22, 2016 / in Blog, General / by Zafar Khan, RPost CEO

Charlie Brown once said, “It’s not what’s under the Christmas tree that matters. It’s who’s around it.” It’s a lovely sentiment, but it’s hard to get into the holiday spirit when the special toy you’ve chosen for your child is taking photos of your child and recording his or her conversations, then transmitting this data via the Internet (for speech recognition processing, for example), where it can easily be associated with your phone records and Internet ID’s, analyzed by p [...]