var varname = "wijax_65646d46600ee656e3ca2b0f9ae2980f"; window[varname]="<span id=\"widget-go-widget-areas-2\" data-remove-on-inject-classes=\" \" class=\"  search-facets go-custom-widget-area_search-facets wijax-widgetclasses widget-go-widget-areas widget-area go-widget-areas-2 \"><\/span>\n<div id=\"scriblio_facets-7\" class=\"facet-technologies-and-products facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Technologies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"selected\" data-term=\"cryptography\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cryptography\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"\" class=\"term-link\" title=\"25 topics\">cryptography<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>25<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"encryption\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/encryption\/\"><span class=\"bar\" style=\"width:36%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+encryption\/\" class=\"term-link\" title=\"9 topics\">encryption<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>9<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Android\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/android\/\"><span class=\"bar\" style=\"width:16%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+android\/\" class=\"term-link\" title=\"4 topics\">Android<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Bitcoin\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/bitcoin\/\"><span class=\"bar\" style=\"width:12%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+bitcoin\/\" class=\"term-link\" title=\"3 topics\">Bitcoin<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"virtual currency\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/virtual-currency\/\"><span class=\"bar\" style=\"width:8%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+virtual-currency\/\" class=\"term-link\" title=\"2 topics\">virtual currency<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"SSL\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/ssl\/\"><span class=\"bar\" style=\"width:8%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+ssl\/\" class=\"term-link\" title=\"2 topics\">SSL<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Microsoft Windows\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/microsoft-windows\/\"><span class=\"bar\" style=\"width:8%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+microsoft-windows\/\" class=\"term-link\" title=\"2 topics\">Microsoft Windows<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"iPhone\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/iphone\/\"><span class=\"bar\" style=\"width:8%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+iphone\/\" class=\"term-link\" title=\"2 topics\">iPhone<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile devices\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mobile-devices\/\"><span class=\"bar\" style=\"width:8%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+mobile-devices\/\" class=\"term-link\" title=\"2 topics\">mobile devices<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"security protocols\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/security-protocols\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+security-protocols\/\" class=\"term-link\" title=\"1 topics\">security protocols<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile data\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mobile-data\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+mobile-data\/\" class=\"term-link\" title=\"1 topics\">mobile data<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"malware\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/malware\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+malware\/\" class=\"term-link\" title=\"1 topics\">malware<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"dvds\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/dvds\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+dvds\/\" class=\"term-link\" title=\"1 topics\">dvds<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Firefox\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/firefox\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+firefox\/\" class=\"term-link\" title=\"1 topics\">Firefox<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"iOS\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/ios\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+ios\/\" class=\"term-link\" title=\"1 topics\">iOS<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Apple TLS\/SSL protocols\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/apple-tlsssl-protocols\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+apple-tlsssl-protocols\/\" class=\"term-link\" title=\"1 topics\">Apple TLS\/SSL protocols<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile operating systems\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mobile-operating-systems\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+mobile-operating-systems\/\" class=\"term-link\" title=\"1 topics\">mobile operating systems<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"VOIP\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/voip\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+voip\/\" class=\"term-link\" title=\"1 topics\">VOIP<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"smart grids\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/smart-grids\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+smart-grids\/\" class=\"term-link\" title=\"1 topics\">smart grids<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Blackberry Messenger\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/blackberry-messenger\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+blackberry-messenger\/\" class=\"term-link\" title=\"1 topics\">Blackberry Messenger<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"BMM protected\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/bmm-protected\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+bmm-protected\/\" class=\"term-link\" title=\"1 topics\">BMM protected<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"4G\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/4g\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+4g\/\" class=\"term-link\" title=\"1 topics\">4G<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"big data\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/big-data\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+big-data\/\" class=\"term-link\" title=\"1 topics\">big data<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"operating systems\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/operating-systems\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+operating-systems\/\" class=\"term-link\" title=\"1 topics\">operating systems<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"internet protocol (IP)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/internet-protocol-ip\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+internet-protocol-ip\/\" class=\"term-link\" title=\"1 topics\">internet protocol (IP)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile device management (MDM)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mobile-device-management-mdm\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+mobile-device-management-mdm\/\" class=\"term-link\" title=\"1 topics\">mobile device management (MDM)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cybersecurity\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+cybersecurity\/\" class=\"term-link\" title=\"1 topics\">cybersecurity<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Safari\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/safari\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+safari\/\" class=\"term-link\" title=\"1 topics\">Safari<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"payment systems\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/payment-systems\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+payment-systems\/\" class=\"term-link\" title=\"1 topics\">payment systems<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"BlackBerry OS\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/blackberry-os\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+blackberry-os\/\" class=\"term-link\" title=\"1 topics\">BlackBerry OS<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"smartphones\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/smartphones\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+smartphones\/\" class=\"term-link\" title=\"1 topics\">smartphones<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"APIs\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/apis\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+apis\/\" class=\"term-link\" title=\"1 topics\">APIs<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"TLS security protocol\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/tls-security-protocol\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+tls-security-protocol\/\" class=\"term-link\" title=\"1 topics\">TLS security protocol<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Windows Azure\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/windows-azure\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+windows-azure\/\" class=\"term-link\" title=\"1 topics\">Windows Azure<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"LTE\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/lte\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+lte\/\" class=\"term-link\" title=\"1 topics\">LTE<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"SSLv3\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/sslv3\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+sslv3\/\" class=\"term-link\" title=\"1 topics\">SSLv3<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"quantum computing\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/quantum-computing\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+quantum-computing\/\" class=\"term-link\" title=\"1 topics\">quantum computing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"internet\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/internet\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+internet\/\" class=\"term-link\" title=\"1 topics\">internet<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"OpenSSL protocol\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/openssl-protocol\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+openssl-protocol\/\" class=\"term-link\" title=\"1 topics\">OpenSSL protocol<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"DLP\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/dlp\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography+dlp\/\" class=\"term-link\" title=\"1 topics\">DLP<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-6\" class=\"facet-companies facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Companies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"National Security Agency (NSA)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/national-security-agency-nsa\/\"><span class=\"bar\" style=\"width:20%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=national-security-agency-nsa\" class=\"term-link\" title=\"5 topics\">National Security Agency (NSA)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Google\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/google\/\"><span class=\"bar\" style=\"width:20%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=google\" class=\"term-link\" title=\"5 topics\">Google<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"BlackBerry\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/blackberry\/\"><span class=\"bar\" style=\"width:16%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=blackberry\" class=\"term-link\" title=\"4 topics\">BlackBerry<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Apple\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/apple\/\"><span class=\"bar\" style=\"width:12%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=apple\" class=\"term-link\" title=\"3 topics\">Apple<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"PayPal\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/paypal\/\"><span class=\"bar\" style=\"width:8%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=paypal\" class=\"term-link\" title=\"2 topics\">PayPal<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Government Communications Headquarters (GCHQ)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/government-communications-headquarters-gchq\/\"><span class=\"bar\" style=\"width:8%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=government-communications-headquarters-gchq\" class=\"term-link\" title=\"2 topics\">Government Communications Headquarters (GCHQ)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Microsoft\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/microsoft\/\"><span class=\"bar\" style=\"width:8%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=microsoft\" class=\"term-link\" title=\"2 topics\">Microsoft<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"US National Intelligence Council\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/us-national-intelligence-council\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=us-national-intelligence-council\" class=\"term-link\" title=\"1 topics\">US National Intelligence Council<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"National Intelligence\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/national-intelligence\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=national-intelligence\" class=\"term-link\" title=\"1 topics\">National Intelligence<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"TiVo\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/tivo\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=tivo\" class=\"term-link\" title=\"1 topics\">TiVo<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"The Guardian\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/the-guardian\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=the-guardian\" class=\"term-link\" title=\"1 topics\">The Guardian<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"federal-trade-commission\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/federal-trade-commission-4\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=federal-trade-commission-4\" class=\"term-link\" title=\"1 topics\">federal-trade-commission<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Yahoo\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/yahoo\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=yahoo\" class=\"term-link\" title=\"1 topics\">Yahoo<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"FBI\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/fbi\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=fbi\" class=\"term-link\" title=\"1 topics\">FBI<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Shopify\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/shopify\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=shopify\" class=\"term-link\" title=\"1 topics\">Shopify<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Rackspace\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/rackspace\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=rackspace\" class=\"term-link\" title=\"1 topics\">Rackspace<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Electronic Frontier Fund\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/electronic-frontier-fund\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=electronic-frontier-fund\" class=\"term-link\" title=\"1 topics\">Electronic Frontier Fund<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"def con\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/def-con\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=def-con\" class=\"term-link\" title=\"1 topics\">def con<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"The New York Times\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/the-new-york-times\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=the-new-york-times\" class=\"term-link\" title=\"1 topics\">The New York Times<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"black hat\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/black-hat\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=black-hat\" class=\"term-link\" title=\"1 topics\">black hat<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Foursquare\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/foursquare\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=foursquare\" class=\"term-link\" title=\"1 topics\">Foursquare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Ionic Security\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/ionic-security\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=ionic-security\" class=\"term-link\" title=\"1 topics\">Ionic Security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"BlackBerry Enterprise Service\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/blackberry-enterprise-service\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=blackberry-enterprise-service\" class=\"term-link\" title=\"1 topics\">BlackBerry Enterprise Service<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"GridCOM Technologies\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/gridcom-technologies\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=gridcom-technologies\" class=\"term-link\" title=\"1 topics\">GridCOM Technologies<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"JP Morgan\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/jp-morgan\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=jp-morgan\" class=\"term-link\" title=\"1 topics\">JP Morgan<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Lavabit\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/lavabit\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=lavabit\" class=\"term-link\" title=\"1 topics\">Lavabit<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"U.S. federal government\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/u-s-federal-government\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=u-s-federal-government\" class=\"term-link\" title=\"1 topics\">U.S. federal government<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"ProtonMail\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/protonmail\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=protonmail\" class=\"term-link\" title=\"1 topics\">ProtonMail<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"US intelligence\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/us-intelligence\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=us-intelligence\" class=\"term-link\" title=\"1 topics\">US intelligence<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Lyft\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/lyft\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=lyft\" class=\"term-link\" title=\"1 topics\">Lyft<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sony\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/sony\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=sony\" class=\"term-link\" title=\"1 topics\">Sony<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Quantum\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/quantum\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=quantum\" class=\"term-link\" title=\"1 topics\">Quantum<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Braintree\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/braintree\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=braintree\" class=\"term-link\" title=\"1 topics\">Braintree<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Telegram\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/telegram\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=telegram\" class=\"term-link\" title=\"1 topics\">Telegram<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Opera\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/opera\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=opera\" class=\"term-link\" title=\"1 topics\">Opera<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CloudFlare\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cloudflare\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=cloudflare\" class=\"term-link\" title=\"1 topics\">CloudFlare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Stripe\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/stripe\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=stripe\" class=\"term-link\" title=\"1 topics\">Stripe<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"McAfee\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/mcafee\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=mcafee\" class=\"term-link\" title=\"1 topics\">McAfee<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"U.S. Patent and Trademark Office\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/u-s-patent-and-trademark-office\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=u-s-patent-and-trademark-office\" class=\"term-link\" title=\"1 topics\">U.S. Patent and Trademark Office<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"EnStream\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/enstream\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=enstream\" class=\"term-link\" title=\"1 topics\">EnStream<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CipherCloud\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/ciphercloud\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?company=ciphercloud\" class=\"term-link\" title=\"1 topics\">CipherCloud<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-11\" class=\"facet-people facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">People<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Edward Snowden\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/edward-snowden\/\"><span class=\"bar\" style=\"width:12%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?person=edward-snowden\" class=\"term-link\" title=\"3 topics\">Edward Snowden<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Barack Obama\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/barack-obama\/\"><span class=\"bar\" style=\"width:8%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?person=barack-obama\" class=\"term-link\" title=\"2 topics\">Barack Obama<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Matthew Green\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/matthew-green\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?person=matthew-green\" class=\"term-link\" title=\"1 topics\">Matthew Green<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"James Comey\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/james-comey\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?person=james-comey\" class=\"term-link\" title=\"1 topics\">James Comey<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"David Cameron\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/david-cameron\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?person=david-cameron\" class=\"term-link\" title=\"1 topics\">David Cameron<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Forbes\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/forbes\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?person=forbes\" class=\"term-link\" title=\"1 topics\">Forbes<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Google\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/google\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?person=google\" class=\"term-link\" title=\"1 topics\">Google<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Eric Holder\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/eric-holder\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?person=eric-holder\" class=\"term-link\" title=\"1 topics\">Eric Holder<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CloudFlare\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/cloudflare\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?person=cloudflare\" class=\"term-link\" title=\"1 topics\">CloudFlare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-2\" class=\"facet-tags facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Other<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/security\/\"><span class=\"bar\" style=\"width:40%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=security\" class=\"term-link\" title=\"10 topics\">security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>10<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Secure communication\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/secure-communication\/\"><span class=\"bar\" style=\"width:12%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=secure-communication\" class=\"term-link\" title=\"3 topics\">Secure communication<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"surveillance\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/surveillance\/\"><span class=\"bar\" style=\"width:12%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=surveillance\" class=\"term-link\" title=\"3 topics\">surveillance<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Transport Layer Security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/transport-layer-security\/\"><span class=\"bar\" style=\"width:12%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=transport-layer-security\" class=\"term-link\" title=\"3 topics\">Transport Layer Security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"privacy\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/privacy\/\"><span class=\"bar\" style=\"width:8%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=privacy\" class=\"term-link\" title=\"2 topics\">privacy<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"HTTP Secure\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/http-secure\/\"><span class=\"bar\" style=\"width:8%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=http-secure\" class=\"term-link\" title=\"2 topics\">HTTP Secure<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data-security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/data-security\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=data-security\" class=\"term-link\" title=\"1 topics\">data-security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Belgium\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/belgium\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=belgium\" class=\"term-link\" title=\"1 topics\">Belgium<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Secure messaging\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/secure-messaging\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=secure-messaging\" class=\"term-link\" title=\"1 topics\">Secure messaging<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"physics\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/physics\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=physics\" class=\"term-link\" title=\"1 topics\">physics<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Quantum information science\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/quantum-information-science\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=quantum-information-science\" class=\"term-link\" title=\"1 topics\">Quantum information science<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"over-the-top (OTT)\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/over-the-top-ott\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=over-the-top-ott\" class=\"term-link\" title=\"1 topics\">over-the-top (OTT)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"TSL\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/tsl\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=tsl\" class=\"term-link\" title=\"1 topics\">TSL<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Trea\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/trea\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=trea\" class=\"term-link\" title=\"1 topics\">Trea<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"homeland security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/homeland-security\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=homeland-security\" class=\"term-link\" title=\"1 topics\">homeland security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"consumer electronics\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/consumer-electronics\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=consumer-electronics\" class=\"term-link\" title=\"1 topics\">consumer electronics<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Poodle bug\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/poodle-bug\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=poodle-bug\" class=\"term-link\" title=\"1 topics\">Poodle bug<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Silent Circle\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/silent-circle\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=silent-circle\" class=\"term-link\" title=\"1 topics\">Silent Circle<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"spam\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/spam\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=spam\" class=\"term-link\" title=\"1 topics\">spam<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"security protocols\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/security-protocols\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=security-protocols\" class=\"term-link\" title=\"1 topics\">security protocols<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"macrovision\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/macrovision\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=macrovision\" class=\"term-link\" title=\"1 topics\">macrovision<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"finances\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/finances\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=finances\" class=\"term-link\" title=\"1 topics\">finances<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Random numbers\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/random-numbers\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=random-numbers\" class=\"term-link\" title=\"1 topics\">Random numbers<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Data Darwinism\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/data-darwinism\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=data-darwinism\" class=\"term-link\" title=\"1 topics\">Data Darwinism<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"messaging\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/messaging\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=messaging\" class=\"term-link\" title=\"1 topics\">messaging<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Max Yuan\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/max-yuan\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=max-yuan\" class=\"term-link\" title=\"1 topics\">Max Yuan<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"PRNG\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/prng\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=prng\" class=\"term-link\" title=\"1 topics\">PRNG<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Phil Zimmermann\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/phil-zimmermann\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=phil-zimmermann\" class=\"term-link\" title=\"1 topics\">Phil Zimmermann<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"crypto wars\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/crypto-wars\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=crypto-wars\" class=\"term-link\" title=\"1 topics\">crypto wars<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"hacking\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/hacking\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=hacking\" class=\"term-link\" title=\"1 topics\">hacking<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"file transfer services\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/file-transfer-services\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=file-transfer-services\" class=\"term-link\" title=\"1 topics\">file transfer services<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jean-Jacques Quisquater\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/jean-jacques-quisquater\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=jean-jacques-quisquater\" class=\"term-link\" title=\"1 topics\">Jean-Jacques Quisquater<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Ambient Data\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/ambient-data\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=ambient-data\" class=\"term-link\" title=\"1 topics\">Ambient Data<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"weak crypto\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/weak-crypto\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=weak-crypto\" class=\"term-link\" title=\"1 topics\">weak crypto<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Robert Oppenheimer\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/robert-oppenheimer\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=robert-oppenheimer\" class=\"term-link\" title=\"1 topics\">Robert Oppenheimer<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mikko Hyponnen\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/mikko-hyponnen\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=mikko-hyponnen\" class=\"term-link\" title=\"1 topics\">Mikko Hyponnen<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"encryption protocols\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/encryption-protocols\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=encryption-protocols\" class=\"term-link\" title=\"1 topics\">encryption protocols<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"man-in-the-middle\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/man-in-the-middle\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=man-in-the-middle\" class=\"term-link\" title=\"1 topics\">man-in-the-middle<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"MI5\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/mi5\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=mi5\" class=\"term-link\" title=\"1 topics\">MI5<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cloud-security\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=cloud-security\" class=\"term-link\" title=\"1 topics\">cloud security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Tech\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/tech\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=tech\" class=\"term-link\" title=\"1 topics\">Tech<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"conventions\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/conventions\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=conventions\" class=\"term-link\" title=\"1 topics\">conventions<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"TLS\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/tls\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=tls\" class=\"term-link\" title=\"1 topics\">TLS<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"disk encryption software\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/disk-encryption-software\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=disk-encryption-software\" class=\"term-link\" title=\"1 topics\">disk encryption software<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Silent Mail\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/silent-mail\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=silent-mail\" class=\"term-link\" title=\"1 topics\">Silent Mail<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"black hat\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/black-hat\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=black-hat\" class=\"term-link\" title=\"1 topics\">black hat<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"BYOD\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/byod\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=byod\" class=\"term-link\" title=\"1 topics\">BYOD<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"retail\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/retail\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=retail\" class=\"term-link\" title=\"1 topics\">retail<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Enterprise\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/enterprise\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=enterprise\" class=\"term-link\" title=\"1 topics\">Enterprise<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"def con\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/def-con\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?tag=def-con\" class=\"term-link\" title=\"1 topics\">def con<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-8\" class=\"facet-author widget widget_scriblio_facets\"><header class=\"widget-title\">Author<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"David Meyer\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/superglaze\/\"><span class=\"bar\" style=\"width:36%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?authors=superglaze\" class=\"term-link\" title=\"9 topics\">David Meyer<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>9<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jonathan Vanian\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/jonathanvanian\/\"><span class=\"bar\" style=\"width:20%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?authors=cap-jonathanvanian\" class=\"term-link\" title=\"5 topics\">Jonathan Vanian<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jeff Roberts\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/jeffr\/\"><span class=\"bar\" style=\"width:8%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?authors=cap-jeffr\" class=\"term-link\" title=\"2 topics\">Jeff Roberts<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Kevin Fitchard\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/kevinfitchard\/\"><span class=\"bar\" style=\"width:8%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?authors=cap-kevinfitchard\" class=\"term-link\" title=\"2 topics\">Kevin Fitchard<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Colleen Taylor\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/colleentaylor\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?authors=cap-colleentaylor\" class=\"term-link\" title=\"1 topics\">Colleen Taylor<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Amanda Alvarez\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/neuroamanda\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?authors=cap-neuroamanda\" class=\"term-link\" title=\"1 topics\">Amanda Alvarez<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Edit Staff\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/gigaedit\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?authors=cap-gigaedit\" class=\"term-link\" title=\"1 topics\">Edit Staff<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Michael Finneran\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/michaelfinneran\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?authors=cap-michaelfinneran\" class=\"term-link\" title=\"1 topics\">Michael Finneran<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Om Malik\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/om\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?authors=om\" class=\"term-link\" title=\"1 topics\">Om Malik<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Kif Leswing\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/kifleswing1\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?authors=cap-kifleswing1\" class=\"term-link\" title=\"1 topics\">Kif Leswing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Lauren Hockenson\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/laurenhockenson1\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/cryptography\/?authors=cap-laurenhockenson1\" class=\"term-link\" title=\"1 topics\">Lauren Hockenson<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-3\" class=\"facet-post-type widget widget_scriblio_facets\"><header class=\"widget-title\">Content Type<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"News Post\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/news-post\/\"><span class=\"bar\" style=\"width:88%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/go-type\/news-post\/?technology=cryptography\" class=\"term-link\" title=\"22 topics\">News Post<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>22<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Report\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/report\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/go-type\/report\/?technology=cryptography\" class=\"term-link\" title=\"1 topics\">Report<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-5\" class=\"facet-property widget widget_scriblio_facets\"><header class=\"widget-title\">Property<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Gigaom\" data-taxonomy=\"Property\" data-term-url=\"http:\/\/search.gigaom.com\/property\/gigaom\/\"><span class=\"bar\" style=\"width:88%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/property\/gigaom\/?technology=cryptography\" class=\"term-link\" title=\"22 topics\">Gigaom<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>22<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Research\" data-taxonomy=\"Property\" data-term-url=\"http:\/\/search.gigaom.com\/property\/research\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/property\/research\/?technology=cryptography\" class=\"term-link\" title=\"1 topics\">Research<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"paidContent\" data-taxonomy=\"Property\" data-term-url=\"http:\/\/search.gigaom.com\/property\/paidcontent\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/property\/paidcontent\/?technology=cryptography\" class=\"term-link\" title=\"1 topics\">paidContent<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-10\" class=\"facet-availability widget widget_scriblio_facets\"><header class=\"widget-title\">Access<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Free\" data-taxonomy=\"Availability\" data-term-url=\"http:\/\/search.gigaom.com\/availability\/free\/\"><span class=\"bar\" style=\"width:96%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/availability\/free\/?technology=cryptography\" class=\"term-link\" title=\"24 topics\">Free<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>24<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Subscription\" data-taxonomy=\"Availability\" data-term-url=\"http:\/\/search.gigaom.com\/availability\/subscription\/\"><span class=\"bar\" style=\"width:4%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/availability\/subscription\/?technology=cryptography\" class=\"term-link\" title=\"1 topics\">Subscription<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div>";
