Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How can it be proved that the encryption used by Hushmail is actually secure?

0
10 Posted

How can it be proved that the encryption used by Hushmail is actually secure?

0
10

Hush is proud of its reputation for security and has had a lot of positive feedback from industry, experts and users. The Java source code for the Hush Encrytion Engine is available to everyone, free of charge. Security experts and computer enthusiasts worldwide have the unrestricted ability to test the strength of the Hush cryptographic system. The source code can be reviewed and downloaded from our downloads page.

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123