Home      Download      Learn more      Tech      Help     
 
 

Tiger Envelopes: Technical


Tiger Privacy 

Overview

Tiger isn't just easy. It's also advanced protection for your mail.

FAQ

Answers to your questions.     General     Support    

Testing

Testers and code reviewers are Tiger Tamers. They get credit right alongside the developers.

Code reviews

Some people beg for money. We beg for code reviews and audits.

Security

Threat model, recommendations, and how to develop software securely

Design

Early outline of features and plans

Open Crypto Engine

Pluggable encryption, with support now for Bouncy Castle, GPG, and PGP

Tiger development

Tiger details for software developers and testers

Secure software

Some recommendations for software developers

Tools

Third party components and tools

Install from source

There's a lot you'll have to do by hand if you don't use one of the installers

Signed Certificates

Why we don't use centralized key servers

The Limits of Encryption

Don't swallow any snake oil

How to surf privately

Right under the NSA's nose


Support Individual Rights Privacy policy
Copyright © 2005-2007 Tiger Privacy
SourceForge