{"id":224,"date":"2017-04-05T18:22:52","date_gmt":"2017-04-05T23:22:52","guid":{"rendered":"https:\/\/amerares.com\/blogs\/confcommblog?page_id=224&#038;preview_id=224"},"modified":"2023-10-11T06:10:10","modified_gmt":"2023-10-11T11:10:10","slug":"confcommblog","status":"publish","type":"page","link":"https:\/\/amerares.com\/blogs\/confcommblog\/","title":{"rendered":"Confidential Communications Blog"},"content":{"rendered":"<div id=\"pl-224\"  class=\"panel-layout\" ><div id=\"pg-224-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-224-0-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-224-0-1\"  class=\"panel-grid-cell panel-grid-cell-empty panel-grid-cell-mobile-last\" ><\/div><div id=\"pgc-224-0-2\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><div id=\"pg-224-1\"  class=\"panel-grid panel-has-style\" ><div class=\"wide-grey panel-row-style panel-row-style-for-224-1\" ><div id=\"pgc-224-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-224-1-0-0\" class=\"so-panel widget widget_headline-widget panel-first-child panel-last-child\" data-index=\"0\" >\t\t<h1>Confidential Communications Blog<\/h1>\n\t\t<div class=\"decoration\"><div class=\"decoration-inside\"><\/div><\/div>\n\t\t<h3><\/h3>\n\t\t<\/div><\/div><\/div><\/div><div id=\"pg-224-2\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-224-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-224-2-0-0\" class=\"so-panel widget widget_siteorigin-panels-postloop panel-first-child panel-last-child\" data-index=\"1\" ><h3 class=\"widget-title\">Latest Posts<\/h3>\n\t<div id=\"vantage-grid-loop\" class=\"vantage-grid-loop grid-loop-columns-4\">\n\t\t\t\t\t<article class=\"grid-post post-660 post type-post status-publish format-standard has-post-thumbnail hentry category-confidential-communications category-featured category-recommendations post-with-thumbnail post-with-thumbnail-icon\">\n\n\t\t\t\t\t\t\t\t\t<a class=\"grid-thumbnail\" href=\"https:\/\/amerares.com\/blogs\/confcommblog-signal-using-the-right-tool-for-the-right-job\/\">\n\t\t\t\t\t\t<img width=\"255\" height=\"272\" src=\"https:\/\/amerares.com\/blogs\/wp-content\/uploads\/2017\/02\/Signal_image3-255x272.png\" class=\"attachment-vantage-grid-loop size-vantage-grid-loop wp-post-image\" alt=\"\" decoding=\"async\" \/>\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t<h3><a href=\"https:\/\/amerares.com\/blogs\/confcommblog-signal-using-the-right-tool-for-the-right-job\/\">Signal: Using the right tool for the right job<\/a><\/h3>\n\t\t\t\t<div class=\"excerpt\"><p>In today\u00b4s world where privacy, anonymity and confidentiality are a required in our day-to-day communications, those features are something most users expect when using a communication tool such as Signal from Open Whisperer Systems. Unfortunately a lot of users tend to mix or use as synonyms each one of those concepts when in reality they [&hellip;]<\/p>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t<article class=\"grid-post post-659 post type-post status-publish format-standard has-post-thumbnail hentry category-confidential-communications category-featured category-news-and-views category-recommendations post-with-thumbnail post-with-thumbnail-icon\">\n\n\t\t\t\t\t\t\t\t\t<a class=\"grid-thumbnail\" href=\"https:\/\/amerares.com\/blogs\/confcommblog-lawyers-slow-to-adopt-email-encryption-and-other-forms-of-secure-communications-aba-survey-finds\/\">\n\t\t\t\t\t\t<img width=\"231\" height=\"59\" src=\"https:\/\/amerares.com\/blogs\/wp-content\/uploads\/2016\/03\/ABA-Journal-logo-3-Screen-shot-2016-03-25-at-3.55.26-PM.png\" class=\"attachment-vantage-grid-loop size-vantage-grid-loop wp-post-image\" alt=\"\" decoding=\"async\" \/>\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t<h3><a href=\"https:\/\/amerares.com\/blogs\/confcommblog-lawyers-slow-to-adopt-email-encryption-and-other-forms-of-secure-communications-aba-survey-finds\/\">Lawyers slow to adopt email encryption and other forms of secure communications, ABA survey finds<\/a><\/h3>\n\t\t\t\t<div class=\"excerpt\"><p>We re-print here a short article from the ABA Journal of October 5, 2015 which provides some numbers for various concerns we often express to law firms when we find security issues with electronic communications that might negatively impact their clients, in particular whistleblowers and qui tam relators: If you\u2019ve ever received an email from [&hellip;]<\/p>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t<article class=\"grid-post post-175 post type-post status-publish format-standard has-post-thumbnail hentry category-confidential-communications category-featured category-recommendations post-with-thumbnail post-with-thumbnail-icon\">\n\n\t\t\t\t\t\t\t\t\t<a class=\"grid-thumbnail\" href=\"https:\/\/amerares.com\/blogs\/confcommblog-our-choices-for-more-secure-and-confidential-communications\/\">\n\t\t\t\t\t\t<img width=\"436\" height=\"272\" src=\"https:\/\/amerares.com\/blogs\/wp-content\/uploads\/2016\/04\/Skype-T9000-malware-image-Screen-shot-2016-04-06-at-11.07.40-AM-436x272.png\" class=\"attachment-vantage-grid-loop size-vantage-grid-loop wp-post-image\" alt=\"\" decoding=\"async\" \/>\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t<h3><a href=\"https:\/\/amerares.com\/blogs\/confcommblog-our-choices-for-more-secure-and-confidential-communications\/\">Our choices for more secure and confidential communications<\/a><\/h3>\n\t\t\t\t<div class=\"excerpt\"><p>Why are we changing our phone service? We have for several years used a Skype telephone service to receive general voicemails. However, since last fall, we have had continual issues keeping that service functioning. Recently, for example, we learned that calls we made to the service went to voicemail, consistent with our longstanding program preferences. [&hellip;]<\/p>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t<article class=\"grid-post post-655 post type-post status-publish format-standard has-post-thumbnail hentry category-confidential-communications category-recommendations post-with-thumbnail post-with-thumbnail-icon\">\n\n\t\t\t\t\t\t\t\t\t<a class=\"grid-thumbnail\" href=\"https:\/\/amerares.com\/blogs\/confcommblog-147\/\">\n\t\t\t\t\t\t<img width=\"342\" height=\"272\" src=\"https:\/\/amerares.com\/blogs\/wp-content\/uploads\/2015\/02\/Ghostery-image-for-anon-post-342x272.png\" class=\"attachment-vantage-grid-loop size-vantage-grid-loop wp-post-image\" alt=\"\" decoding=\"async\" \/>\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t<h3><a href=\"https:\/\/amerares.com\/blogs\/confcommblog-147\/\">Digital Identity and Metadata<\/a><\/h3>\n\t\t\t\t<div class=\"excerpt\"><p>\u00a0The fight to stay anonymous People by nature want to keep certain aspects of their life private, anonymous; others because their jobs require to stay anonymous and others because what they are doing could lead to repercussions in their professional and personal lives. The funny thing is that most people think that just because they [&hellip;]<\/p>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t\t<div class=\"clear\"><\/div>\n\t\t\t\t\t\t\t<article class=\"grid-post post-650 post type-post status-publish format-standard has-post-thumbnail hentry category-confidential-communications category-news-and-views post-with-thumbnail post-with-thumbnail-icon\">\n\n\t\t\t\t\t\t\t\t\t<a class=\"grid-thumbnail\" href=\"https:\/\/amerares.com\/blogs\/confcommblog-last-tor-block-post-transferred-within-nicks-account-012715-edit-this\/\">\n\t\t\t\t\t\t<img width=\"202\" height=\"104\" src=\"https:\/\/amerares.com\/blogs\/wp-content\/uploads\/2015\/01\/1-Tor-Screen-shot-2015-01-12-at-3.14.57-PM.png\" class=\"attachment-vantage-grid-loop size-vantage-grid-loop wp-post-image\" alt=\"\" decoding=\"async\" \/>\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t<h3><a href=\"https:\/\/amerares.com\/blogs\/confcommblog-last-tor-block-post-transferred-within-nicks-account-012715-edit-this\/\">Service Provider Blocks Tor to Silent Circle Claiming Security Threat<\/a><\/h3>\n\t\t\t\t<div class=\"excerpt\"><p>\u00a0Service Provider Blocks Tor to Silent Circle Claiming Security Threat January 21 2015The Claim:&#8221;Tor exist nodes are routinely used as methods by Threat Actors to exfiltrate data from compromised endpoints. As an example, the Financial Sector has seen significant issues from them.\u201c FireHostThe Issues:\u2022 Bad guys use it; let\u2019s treat everybody as bad guys \u2022 [&hellip;]<\/p>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t\t\t<article class=\"grid-post post-649 post type-post status-publish format-standard has-post-thumbnail hentry category-confidential-communications category-email category-featured category-recommendations post-with-thumbnail post-with-thumbnail-icon\">\n\n\t\t\t\t\t\t\t\t\t<a class=\"grid-thumbnail\" href=\"https:\/\/amerares.com\/blogs\/confcommblog-email-insecurity-video\/\">\n\t\t\t\t\t\t<img width=\"436\" height=\"272\" src=\"https:\/\/amerares.com\/blogs\/wp-content\/uploads\/2015\/01\/Screen-shot-2015-01-19-at-11.03.01-PM-436x272.png\" class=\"attachment-vantage-grid-loop size-vantage-grid-loop wp-post-image\" alt=\"\" decoding=\"async\" \/>\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t<h3><a href=\"https:\/\/amerares.com\/blogs\/confcommblog-email-insecurity-video\/\">Email insecurity video<\/a><\/h3>\n\t\t\t\t<div class=\"excerpt\"><p>This article is a the first in a series aimed to people who are looking to understand the risks of using the internet as a primary communication channel, especially for sensitive subjects. Let\u2019s start with something that has become an indispensable tool for communication in our world and I\u2019m referring to the email. Email can [&hellip;]<\/p>\n<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/article>\n\t\t\t\t<\/div>\n\n\t<\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>This article is a the first in a series aimed to people who are looking to understand the risks of using the internet as a primary communication channel, especially for sensitive subjects. Let\u2019s start with something that has become an indispensable tool for communication in our world and I\u2019m referring to the email. Email can [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"home-panels.php","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/amerares.com\/blogs\/wp-json\/wp\/v2\/pages\/224"}],"collection":[{"href":"https:\/\/amerares.com\/blogs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/amerares.com\/blogs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/amerares.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/amerares.com\/blogs\/wp-json\/wp\/v2\/comments?post=224"}],"version-history":[{"count":5,"href":"https:\/\/amerares.com\/blogs\/wp-json\/wp\/v2\/pages\/224\/revisions"}],"predecessor-version":[{"id":772,"href":"https:\/\/amerares.com\/blogs\/wp-json\/wp\/v2\/pages\/224\/revisions\/772"}],"wp:attachment":[{"href":"https:\/\/amerares.com\/blogs\/wp-json\/wp\/v2\/media?parent=224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}