Do you need encryption?
Do YOU need encryption?

NetAction's Guide to Using Encryption Software

Table of Contents

  1. What is encryption, and how does it work?
  2. Do I need encryption?
  3. How does encryption software keep my information secure?
  4. What features are available in encryption software?
  5. What are the vulnerabilities in encryption, and how do I guard against them?
  6. Where can I get more encryption software?
  7. Why does the U.S. government want to restrict the use of encryption software?
  8. Where can I read more about encryption?
  9. How do I find out whether a particular encryption program is legally available where I live?
  10. Cryptography Terms
  11. Appendices
  12. Software Reviews

About This Guide

NetAction prepared this guide primarily to help U.S.-based organizations and activists learn to use encryption software. If you are located outside the U.S., you will need to determine whether the use of encryption is restricted in your location before downloading any of the encryption software discussed in this guide.

This guide was researched by Matt McCarthy and co-written by Matt McCarthy and Audrie Krause, with editorial assistance provided by Theresa Chen and Andrea Jepson. This guide is available, without software reviews, as a single HTML document, a Microsoft Word 98 document, and in ASCII text.

Copyright 2001 by NetAction. All material in this guide may be reposted or reproduced for non-commercial use provided NetAction is cited as the source.