|
Tiger Privacy |
Tiger isn't just easy. It's also advanced protection for your mail. |
|
Testers and code reviewers are Tiger Tamers. They get credit right alongside the developers. |
|
Some people beg for money. We beg for code reviews and audits. |
|
Threat model, recommendations, and how to develop software securely |
|
Early outline of features and plans |
|
Pluggable encryption, with support now for Bouncy Castle, GPG, and PGP |
|
Tiger details for software developers and testers |
|
Some recommendations for software developers |
|
Third party components and tools |
|
There's a lot you'll have to do by hand if you don't use one of the installers |
|
Why we don't use centralized key servers |
|
Don't swallow any snake oil |
|
Right under the NSA's nose |
Privacy policy
Copyright © 2005-2007 Tiger Privacy |