| 
       
      Tiger Privacy  | 
    
| 
           Tiger isn't just easy. It's also advanced protection for your mail.  | 
      |
| 
           Testers and code reviewers are Tiger Tamers. They get credit right alongside the developers.  | 
      |
| 
           Some people beg for money. We beg for code reviews and audits.  | 
      |
| 
           Threat model, recommendations, and how to develop software securely  | 
      |
| 
           Early outline of features and plans  | 
      |
| 
           Pluggable encryption, with support now for Bouncy Castle, GPG, and PGP  | 
      |
| 
           Tiger details for software developers and testers  | 
      |
| 
           Some recommendations for software developers  | 
      |
| 
           Third party components and tools  | 
      |
| 
           There's a lot you'll have to do by hand if you don't use one of the installers  | 
      |
| 
           Why we don't use centralized key servers  | 
      |
| 
           Don't swallow any snake oil  | 
      |
| 
           Right under the NSA's nose  | 
      
             
         | 
    
        
            Privacy policy
             Copyright © 2005-2007 Tiger Privacy  | 
    
        
             |