var varname = "wijax_1cb25f440da587b0cd8e4231ace7f83b"; window[varname]="<span id=\"widget-go-widget-areas-2\" data-remove-on-inject-classes=\" \" class=\"  search-facets go-custom-widget-area_search-facets wijax-widgetclasses widget-go-widget-areas widget-area go-widget-areas-2 \"><\/span>\n<div id=\"scriblio_facets-7\" class=\"facet-technologies-and-products facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Technologies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"selected\" data-term=\"encryption\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/encryption\/\"><span class=\"bar\" style=\"width:100%;\"><\/span><a href=\"\" class=\"term-link\" title=\"141 topics\">encryption<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>141<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"SSL\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/ssl\/\"><span class=\"bar\" style=\"width:14.893617021277%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+ssl\/\" class=\"term-link\" title=\"21 topics\">SSL<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>21<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud computing\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cloud-computing\/\"><span class=\"bar\" style=\"width:14.184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+cloud-computing\/\" class=\"term-link\" title=\"20 topics\">cloud computing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>20<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"openssl\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/openssl\/\"><span class=\"bar\" style=\"width:9.9290780141844%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+openssl\/\" class=\"term-link\" title=\"14 topics\">openssl<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>14<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Heartbleed\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/heartbleed\/\"><span class=\"bar\" style=\"width:8.5106382978723%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+heartbleed\/\" class=\"term-link\" title=\"12 topics\">Heartbleed<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>12<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"smartphones\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/smartphones\/\"><span class=\"bar\" style=\"width:7.8014184397163%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+smartphones\/\" class=\"term-link\" title=\"11 topics\">smartphones<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>11<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Android\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/android\/\"><span class=\"bar\" style=\"width:7.0921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+android\/\" class=\"term-link\" title=\"10 topics\">Android<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>10<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Amazon Web Services (AWS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/amazon-web-services-aws\/\"><span class=\"bar\" style=\"width:6.3829787234043%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+amazon-web-services-aws\/\" class=\"term-link\" title=\"9 topics\">Amazon Web Services (AWS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>9<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cloud Storage\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cloud-storage\/\"><span class=\"bar\" style=\"width:6.3829787234043%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+cloud-storage\/\" class=\"term-link\" title=\"9 topics\">Cloud Storage<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>9<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cryptography\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cryptography\/\"><span class=\"bar\" style=\"width:6.3829787234043%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+cryptography\/\" class=\"term-link\" title=\"9 topics\">cryptography<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>9<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"big data\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/big-data\/\"><span class=\"bar\" style=\"width:5.6737588652482%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+big-data\/\" class=\"term-link\" title=\"8 topics\">big data<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>8<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"iPhone\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/iphone\/\"><span class=\"bar\" style=\"width:5.6737588652482%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+iphone\/\" class=\"term-link\" title=\"8 topics\">iPhone<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>8<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"iOS\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/ios\/\"><span class=\"bar\" style=\"width:4.9645390070922%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+ios\/\" class=\"term-link\" title=\"7 topics\">iOS<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Gmail\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/gmail\/\"><span class=\"bar\" style=\"width:4.9645390070922%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+gmail\/\" class=\"term-link\" title=\"7 topics\">Gmail<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"email\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/email\/\"><span class=\"bar\" style=\"width:4.2553191489362%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+email\/\" class=\"term-link\" title=\"6 topics\">email<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cybersecurity\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/cybersecurity\/\"><span class=\"bar\" style=\"width:4.2553191489362%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+cybersecurity\/\" class=\"term-link\" title=\"6 topics\">cybersecurity<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Linux\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/linux\/\"><span class=\"bar\" style=\"width:3.5460992907801%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+linux\/\" class=\"term-link\" title=\"5 topics\">Linux<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile phones\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mobile-phones\/\"><span class=\"bar\" style=\"width:3.5460992907801%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+mobile-phones\/\" class=\"term-link\" title=\"5 topics\">mobile phones<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"PRISM\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/prism\/\"><span class=\"bar\" style=\"width:2.8368794326241%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+prism\/\" class=\"term-link\" title=\"4 topics\">PRISM<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"tablets\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/tablets\/\"><span class=\"bar\" style=\"width:2.8368794326241%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+tablets\/\" class=\"term-link\" title=\"4 topics\">tablets<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"operating systems\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/operating-systems\/\"><span class=\"bar\" style=\"width:2.8368794326241%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+operating-systems\/\" class=\"term-link\" title=\"4 topics\">operating systems<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"malware\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/malware\/\"><span class=\"bar\" style=\"width:2.8368794326241%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+malware\/\" class=\"term-link\" title=\"4 topics\">malware<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"wi-fi\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/wi-fi\/\"><span class=\"bar\" style=\"width:2.8368794326241%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+wi-fi\/\" class=\"term-link\" title=\"4 topics\">wi-fi<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"servers\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/servers\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+servers\/\" class=\"term-link\" title=\"3 topics\">servers<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile devices\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mobile-devices\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+mobile-devices\/\" class=\"term-link\" title=\"3 topics\">mobile devices<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"software as a service (SaaS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/software-as-a-service-saas\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+software-as-a-service-saas\/\" class=\"term-link\" title=\"3 topics\">software as a service (SaaS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data centers\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/data-centers\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+data-centers\/\" class=\"term-link\" title=\"3 topics\">data centers<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"software\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/software\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+software\/\" class=\"term-link\" title=\"3 topics\">software<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Windows Azure\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/windows-azure\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+windows-azure\/\" class=\"term-link\" title=\"3 topics\">Windows Azure<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Chrome\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/chrome\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+chrome\/\" class=\"term-link\" title=\"3 topics\">Chrome<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mobile operating systems\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mobile-operating-systems\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+mobile-operating-systems\/\" class=\"term-link\" title=\"3 topics\">mobile operating systems<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"iPad\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/ipad\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+ipad\/\" class=\"term-link\" title=\"3 topics\">iPad<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"firewall\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/firewall\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+firewall\/\" class=\"term-link\" title=\"2 topics\">firewall<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Databases\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/databases\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+databases\/\" class=\"term-link\" title=\"2 topics\">Databases<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"platform as a service (PaaS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/platform-as-a-service-paas\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+platform-as-a-service-paas\/\" class=\"term-link\" title=\"2 topics\">platform as a service (PaaS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"hotspots\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/hotspots\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+hotspots\/\" class=\"term-link\" title=\"2 topics\">hotspots<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Hadoop\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/hadoop\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+hadoop\/\" class=\"term-link\" title=\"2 topics\">Hadoop<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Bluetooth\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/bluetooth\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+bluetooth\/\" class=\"term-link\" title=\"2 topics\">Bluetooth<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Microsoft OneDrive\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/microsoft-onedrive\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+microsoft-onedrive\/\" class=\"term-link\" title=\"2 topics\">Microsoft OneDrive<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Business Intelligence\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/business-intelligence\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+business-intelligence\/\" class=\"term-link\" title=\"2 topics\">Business Intelligence<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Force.com\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/force-com\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+force-com\/\" class=\"term-link\" title=\"2 topics\">Force.com<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Microsoft Outlook\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/microsoft-outlook\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+microsoft-outlook\/\" class=\"term-link\" title=\"2 topics\">Microsoft Outlook<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"machine to machine (M2M)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/machine-to-machine-m2m\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+machine-to-machine-m2m\/\" class=\"term-link\" title=\"2 topics\">machine to machine (M2M)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"storage\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/storage\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+storage\/\" class=\"term-link\" title=\"2 topics\">storage<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"apache\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/apache\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+apache\/\" class=\"term-link\" title=\"2 topics\">apache<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"mesh networking\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/mesh-networking\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+mesh-networking\/\" class=\"term-link\" title=\"2 topics\">mesh networking<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"quantum computing\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/quantum-computing\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+quantum-computing\/\" class=\"term-link\" title=\"2 topics\">quantum computing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"information technology (IT)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/information-technology-it\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+information-technology-it\/\" class=\"term-link\" title=\"2 topics\">information technology (IT)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"infrastructure as a service (IaaS)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/infrastructure-as-a-service-iaas\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+infrastructure-as-a-service-iaas\/\" class=\"term-link\" title=\"2 topics\">infrastructure as a service (IaaS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"internet protocol (IP)\" data-taxonomy=\"Technologies and Products\" data-term-url=\"http:\/\/search.gigaom.com\/technology\/internet-protocol-ip\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption+internet-protocol-ip\/\" class=\"term-link\" title=\"2 topics\">internet protocol (IP)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-6\" class=\"facet-companies facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Companies<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Google\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/google\/\"><span class=\"bar\" style=\"width:26.241134751773%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=google\" class=\"term-link\" title=\"37 topics\">Google<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>37<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"National Security Agency (NSA)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/national-security-agency-nsa\/\"><span class=\"bar\" style=\"width:16.312056737589%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=national-security-agency-nsa\" class=\"term-link\" title=\"23 topics\">National Security Agency (NSA)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>23<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Microsoft\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/microsoft\/\"><span class=\"bar\" style=\"width:16.312056737589%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=microsoft\" class=\"term-link\" title=\"23 topics\">Microsoft<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>23<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Apple\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/apple\/\"><span class=\"bar\" style=\"width:14.893617021277%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=apple\" class=\"term-link\" title=\"21 topics\">Apple<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>21<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Amazon\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/amazon\/\"><span class=\"bar\" style=\"width:10.63829787234%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=amazon\" class=\"term-link\" title=\"15 topics\">Amazon<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>15<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Facebook\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/facebook\/\"><span class=\"bar\" style=\"width:4.9645390070922%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=facebook\" class=\"term-link\" title=\"7 topics\">Facebook<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Dropbox\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/dropbox\/\"><span class=\"bar\" style=\"width:4.9645390070922%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=dropbox\" class=\"term-link\" title=\"7 topics\">Dropbox<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cisco Systems\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cisco-systems\/\"><span class=\"bar\" style=\"width:3.5460992907801%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=cisco-systems\" class=\"term-link\" title=\"5 topics\">Cisco Systems<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Box\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/box\/\"><span class=\"bar\" style=\"width:3.5460992907801%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=box\" class=\"term-link\" title=\"5 topics\">Box<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"IBM\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/ibm\/\"><span class=\"bar\" style=\"width:3.5460992907801%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=ibm\" class=\"term-link\" title=\"5 topics\">IBM<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CloudFlare\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/cloudflare\/\"><span class=\"bar\" style=\"width:3.5460992907801%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=cloudflare\" class=\"term-link\" title=\"5 topics\">CloudFlare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Skype\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/skype\/\"><span class=\"bar\" style=\"width:2.8368794326241%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=skype\" class=\"term-link\" title=\"4 topics\">Skype<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"National Institute of Standards and Technology (NIST)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/national-institute-of-standards-and-technology-nist\/\"><span class=\"bar\" style=\"width:2.8368794326241%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=national-institute-of-standards-and-technology-nist\" class=\"term-link\" title=\"4 topics\">National Institute of Standards and Technology (NIST)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Silent Circle\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/silent-circle\/\"><span class=\"bar\" style=\"width:2.8368794326241%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=silent-circle\" class=\"term-link\" title=\"4 topics\">Silent Circle<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Ionic Security\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/ionic-security\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=ionic-security\" class=\"term-link\" title=\"3 topics\">Ionic Security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Salesforce\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/salesforce\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=salesforce\" class=\"term-link\" title=\"3 topics\">Salesforce<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mega\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/mega\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=mega\" class=\"term-link\" title=\"3 topics\">Mega<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Twitter\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/twitter\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=twitter\" class=\"term-link\" title=\"3 topics\">Twitter<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Government Communications Headquarters (GCHQ)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/government-communications-headquarters-gchq\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=government-communications-headquarters-gchq\" class=\"term-link\" title=\"3 topics\">Government Communications Headquarters (GCHQ)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"FBI\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/fbi\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=fbi\" class=\"term-link\" title=\"3 topics\">FBI<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"U.S. federal government\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/u-s-federal-government\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=u-s-federal-government\" class=\"term-link\" title=\"3 topics\">U.S. federal government<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Linux Foundation\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/linux-foundation\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=linux-foundation\" class=\"term-link\" title=\"3 topics\">Linux Foundation<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Yahoo\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/yahoo\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=yahoo\" class=\"term-link\" title=\"3 topics\">Yahoo<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Juniper Networks\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/juniper-networks\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=juniper-networks\" class=\"term-link\" title=\"3 topics\">Juniper Networks<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"BlackBerry\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/blackberry\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=blackberry\" class=\"term-link\" title=\"3 topics\">BlackBerry<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Oracle\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/oracle\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=oracle\" class=\"term-link\" title=\"3 topics\">Oracle<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Hewlett-Packard (HP)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/hewlett-packard-hp\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=hewlett-packard-hp\" class=\"term-link\" title=\"3 topics\">Hewlett-Packard (HP)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mozilla\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/mozilla\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=mozilla\" class=\"term-link\" title=\"2 topics\">Mozilla<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"PayPal\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/paypal\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=paypal\" class=\"term-link\" title=\"2 topics\">PayPal<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CipherCloud\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/ciphercloud\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=ciphercloud\" class=\"term-link\" title=\"2 topics\">CipherCloud<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"FireEye\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/fireeye\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=fireeye\" class=\"term-link\" title=\"2 topics\">FireEye<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Lenovo\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/lenovo\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=lenovo\" class=\"term-link\" title=\"2 topics\">Lenovo<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Electronic Frontier Foundation (EFF)\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/electronic-frontier-foundation-eff\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=electronic-frontier-foundation-eff\" class=\"term-link\" title=\"2 topics\">Electronic Frontier Foundation (EFF)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Ericsson\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/ericsson\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=ericsson\" class=\"term-link\" title=\"2 topics\">Ericsson<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"AES\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/aes\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=aes\" class=\"term-link\" title=\"2 topics\">AES<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"EMC\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/emc\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=emc\" class=\"term-link\" title=\"2 topics\">EMC<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"The Pirate Bay\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/the-pirate-bay\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=the-pirate-bay\" class=\"term-link\" title=\"2 topics\">The Pirate Bay<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"salesforce.com.\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/salesforce-com-2\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=salesforce-com-2\" class=\"term-link\" title=\"2 topics\">salesforce.com.<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Gazzang\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/gazzang\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=gazzang\" class=\"term-link\" title=\"2 topics\">Gazzang<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"intuit\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/intuit\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=intuit\" class=\"term-link\" title=\"2 topics\">intuit<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"RSA\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/rsa\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=rsa\" class=\"term-link\" title=\"2 topics\">RSA<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Deutsche Telekom\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/deutsche-telekom\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=deutsche-telekom\" class=\"term-link\" title=\"2 topics\">Deutsche Telekom<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"ProtonMail\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/protonmail\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=protonmail\" class=\"term-link\" title=\"2 topics\">ProtonMail<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Bitcasa\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/bitcasa\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=bitcasa\" class=\"term-link\" title=\"2 topics\">Bitcasa<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"KPN\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/kpn\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=kpn\" class=\"term-link\" title=\"2 topics\">KPN<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"LG\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/lg\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=lg\" class=\"term-link\" title=\"2 topics\">LG<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sony\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/sony\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=sony\" class=\"term-link\" title=\"2 topics\">Sony<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Palo Alto Networks\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/palo-alto-networks\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=palo-alto-networks\" class=\"term-link\" title=\"2 topics\">Palo Alto Networks<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Adobe\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/adobe\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=adobe\" class=\"term-link\" title=\"2 topics\">Adobe<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Symantec\" data-taxonomy=\"Companies\" data-term-url=\"http:\/\/search.gigaom.com\/company\/symantec\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?company=symantec\" class=\"term-link\" title=\"2 topics\">Symantec<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-11\" class=\"facet-people facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">People<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Edward Snowden\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/edward-snowden\/\"><span class=\"bar\" style=\"width:9.2198581560284%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=edward-snowden\" class=\"term-link\" title=\"13 topics\">Edward Snowden<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>13<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Barack Obama\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/barack-obama\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=barack-obama\" class=\"term-link\" title=\"2 topics\">Barack Obama<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"James Comey\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/james-comey\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=james-comey\" class=\"term-link\" title=\"2 topics\">James Comey<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Eric Holder\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/eric-holder\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=eric-holder\" class=\"term-link\" title=\"2 topics\">Eric Holder<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"David Cameron\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/david-cameron\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=david-cameron\" class=\"term-link\" title=\"2 topics\">David Cameron<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jeff Hussey\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/jeff-hussey\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=jeff-hussey\" class=\"term-link\" title=\"1 topics\">Jeff Hussey<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Bruce Schneier\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/bruce-schneier\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=bruce-schneier\" class=\"term-link\" title=\"1 topics\">Bruce Schneier<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Aaron Levie\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/aaron-levie\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=aaron-levie\" class=\"term-link\" title=\"1 topics\">Aaron Levie<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Corey Sanders\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/corey-sanders\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=corey-sanders\" class=\"term-link\" title=\"1 topics\">Corey Sanders<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Matthew Green\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/matthew-green\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=matthew-green\" class=\"term-link\" title=\"1 topics\">Matthew Green<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Brandon Edwards\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/brandon-edwards\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=brandon-edwards\" class=\"term-link\" title=\"1 topics\">Brandon Edwards<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Brooks Buffington\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/brooks-buffington\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=brooks-buffington\" class=\"term-link\" title=\"1 topics\">Brooks Buffington<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Janakiram MSV\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/janakiram-msv\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=janakiram-msv\" class=\"term-link\" title=\"1 topics\">Janakiram MSV<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Matt Cutts\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/matt-cutts\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=matt-cutts\" class=\"term-link\" title=\"1 topics\">Matt Cutts<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"court filing\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/court-filing\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=court-filing\" class=\"term-link\" title=\"1 topics\">court filing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Ajay Arora\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/ajay-arora\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=ajay-arora\" class=\"term-link\" title=\"1 topics\">Ajay Arora<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Andrew R. Jassy\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/andrew-r-jassy\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=andrew-r-jassy\" class=\"term-link\" title=\"1 topics\">Andrew R. Jassy<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Facebook\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/facebook\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=facebook\" class=\"term-link\" title=\"1 topics\">Facebook<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Farid Fadaie\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/farid-fadaie\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=farid-fadaie\" class=\"term-link\" title=\"1 topics\">Farid Fadaie<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Matt Thomlinson\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/matt-thomlinson\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=matt-thomlinson\" class=\"term-link\" title=\"1 topics\">Matt Thomlinson<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Brian Krebs\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/brian-krebs\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=brian-krebs\" class=\"term-link\" title=\"1 topics\">Brian Krebs<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jari Arkko\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/jari-arkko\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=jari-arkko\" class=\"term-link\" title=\"1 topics\">Jari Arkko<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Forbes\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/forbes\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=forbes\" class=\"term-link\" title=\"1 topics\">Forbes<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Anand Chari\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/anand-chari\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=anand-chari\" class=\"term-link\" title=\"1 topics\">Anand Chari<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Adrienne Porter Felt\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/adrienne-porter-felt\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=adrienne-porter-felt\" class=\"term-link\" title=\"1 topics\">Adrienne Porter Felt<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Tyler Droll\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/tyler-droll\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=tyler-droll\" class=\"term-link\" title=\"1 topics\">Tyler Droll<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Amazon\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/amazon\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=amazon\" class=\"term-link\" title=\"1 topics\">Amazon<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Werner Vogels\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/werner-vogels\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=werner-vogels\" class=\"term-link\" title=\"1 topics\">Werner Vogels<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Stephen Farrell\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/stephen-farrell\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=stephen-farrell\" class=\"term-link\" title=\"1 topics\">Stephen Farrell<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Pravin Kothari\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/pravin-kothari\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=pravin-kothari\" class=\"term-link\" title=\"1 topics\">Pravin Kothari<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Andy Jassy\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/andy-jassy\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=andy-jassy\" class=\"term-link\" title=\"1 topics\">Andy Jassy<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mike Kail\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/mike-kail\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=mike-kail\" class=\"term-link\" title=\"1 topics\">Mike Kail<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Brian Taptich\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/brian-taptich\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=brian-taptich\" class=\"term-link\" title=\"1 topics\">Brian Taptich<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Google\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/google\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=google\" class=\"term-link\" title=\"1 topics\">Google<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Sanford Moskowitz\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/sanford-moskowitz\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=sanford-moskowitz\" class=\"term-link\" title=\"1 topics\">Sanford Moskowitz<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Bill Veghte\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/bill-veghte\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=bill-veghte\" class=\"term-link\" title=\"1 topics\">Bill Veghte<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CloudFlare\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/cloudflare\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=cloudflare\" class=\"term-link\" title=\"1 topics\">CloudFlare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Adam Ghetti\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/adam-ghetti\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=adam-ghetti\" class=\"term-link\" title=\"1 topics\">Adam Ghetti<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"court document\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/court-document\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=court-document\" class=\"term-link\" title=\"1 topics\">court document<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Matthew Prince\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/matthew-prince\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=matthew-prince\" class=\"term-link\" title=\"1 topics\">Matthew Prince<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jason Stockman\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/jason-stockman\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=jason-stockman\" class=\"term-link\" title=\"1 topics\">Jason Stockman<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Lisa Monaco\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/lisa-monaco\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=lisa-monaco\" class=\"term-link\" title=\"1 topics\">Lisa Monaco<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Box spokesperson\" data-taxonomy=\"People\" data-term-url=\"http:\/\/search.gigaom.com\/person\/box-spokesperson\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?person=box-spokesperson\" class=\"term-link\" title=\"1 topics\">Box spokesperson<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-2\" class=\"facet-tags facet-group-tag widget widget_scriblio_facets\"><header class=\"widget-title\">Other<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/security\/\"><span class=\"bar\" style=\"width:39.716312056738%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=security\" class=\"term-link\" title=\"56 topics\">security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>56<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"privacy\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/privacy\/\"><span class=\"bar\" style=\"width:17.730496453901%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=privacy\" class=\"term-link\" title=\"25 topics\">privacy<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>25<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"surveillance\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/surveillance\/\"><span class=\"bar\" style=\"width:10.63829787234%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=surveillance\" class=\"term-link\" title=\"15 topics\">surveillance<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>15<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"hacking\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/hacking\/\"><span class=\"bar\" style=\"width:6.3829787234043%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=hacking\" class=\"term-link\" title=\"9 topics\">hacking<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>9<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data-security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/data-security\/\"><span class=\"bar\" style=\"width:3.5460992907801%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=data-security\" class=\"term-link\" title=\"5 topics\">data-security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cloud-security\/\"><span class=\"bar\" style=\"width:3.5460992907801%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=cloud-security\" class=\"term-link\" title=\"5 topics\">cloud security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"https\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/https\/\"><span class=\"bar\" style=\"width:3.5460992907801%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=https\" class=\"term-link\" title=\"5 topics\">https<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>5<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"man-in-the-middle\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/man-in-the-middle\/\"><span class=\"bar\" style=\"width:2.8368794326241%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=man-in-the-middle\" class=\"term-link\" title=\"4 topics\">man-in-the-middle<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Silent Circle\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/silent-circle\/\"><span class=\"bar\" style=\"width:2.8368794326241%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=silent-circle\" class=\"term-link\" title=\"4 topics\">Silent Circle<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"TLS\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/tls\/\"><span class=\"bar\" style=\"width:2.8368794326241%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=tls\" class=\"term-link\" title=\"4 topics\">TLS<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Phil Zimmermann\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/phil-zimmermann\/\"><span class=\"bar\" style=\"width:2.8368794326241%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=phil-zimmermann\" class=\"term-link\" title=\"4 topics\">Phil Zimmermann<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"kim dotcom\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/kim-dotcom\/\"><span class=\"bar\" style=\"width:2.8368794326241%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=kim-dotcom\" class=\"term-link\" title=\"4 topics\">kim dotcom<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Secure communication\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/secure-communication\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=secure-communication\" class=\"term-link\" title=\"3 topics\">Secure communication<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"cloud infrastructure\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cloud-infrastructure\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=cloud-infrastructure\" class=\"term-link\" title=\"3 topics\">cloud infrastructure<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"messaging\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/messaging\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=messaging\" class=\"term-link\" title=\"3 topics\">messaging<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"internet service providers (ISPs)\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/internet-service-providers-isps\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=internet-service-providers-isps\" class=\"term-link\" title=\"3 topics\">internet service providers (ISPs)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Cyberwarfare\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cyberwarfare\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=cyberwarfare\" class=\"term-link\" title=\"3 topics\">Cyberwarfare<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Internet privacy\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/internet-privacy\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=internet-privacy\" class=\"term-link\" title=\"3 topics\">Internet privacy<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"TrueCrypt\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/truecrypt\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=truecrypt\" class=\"term-link\" title=\"3 topics\">TrueCrypt<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Transport Layer Security\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/transport-layer-security\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=transport-layer-security\" class=\"term-link\" title=\"3 topics\">Transport Layer Security<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"end-to-end encryption\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/end-to-end-encryption\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=end-to-end-encryption\" class=\"term-link\" title=\"3 topics\">end-to-end encryption<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Security startup\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/security-startup\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=security-startup\" class=\"term-link\" title=\"3 topics\">Security startup<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Key management\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/key-management\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=key-management\" class=\"term-link\" title=\"3 topics\">Key management<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"law enforcement\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/law-enforcement\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=law-enforcement\" class=\"term-link\" title=\"2 topics\">law enforcement<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data storage\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/data-storage\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=data-storage\" class=\"term-link\" title=\"2 topics\">data storage<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Certificate authority\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/certificate-authority\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=certificate-authority\" class=\"term-link\" title=\"2 topics\">Certificate authority<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"CIOs\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/cios\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=cios\" class=\"term-link\" title=\"2 topics\">CIOs<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Re:invent 2014\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/reinvent-2014\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=reinvent-2014\" class=\"term-link\" title=\"2 topics\">Re:invent 2014<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"BYOD\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/byod\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=byod\" class=\"term-link\" title=\"2 topics\">BYOD<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Crypto\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/crypto\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=crypto\" class=\"term-link\" title=\"2 topics\">Crypto<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Secure email\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/secure-email\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=secure-email\" class=\"term-link\" title=\"2 topics\">Secure email<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"HTTP Secure\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/http-secure\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=http-secure\" class=\"term-link\" title=\"2 topics\">HTTP Secure<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"RSA\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/rsa\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=rsa\" class=\"term-link\" title=\"2 topics\">RSA<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Silent Mail\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/silent-mail\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=silent-mail\" class=\"term-link\" title=\"2 topics\">Silent Mail<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"vulnerability\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/vulnerability\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=vulnerability\" class=\"term-link\" title=\"2 topics\">vulnerability<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"VPNs\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/vpns\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=vpns\" class=\"term-link\" title=\"2 topics\">VPNs<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"certificates\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/certificates\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=certificates\" class=\"term-link\" title=\"2 topics\">certificates<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"denial-of-service (DoS)\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/denial-of-service-dos\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=denial-of-service-dos\" class=\"term-link\" title=\"2 topics\">denial-of-service (DoS)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"encrypted communications\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/encrypted-communications\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=encrypted-communications\" class=\"term-link\" title=\"2 topics\">encrypted communications<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"data management\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/data-management\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=data-management\" class=\"term-link\" title=\"2 topics\">data management<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"China\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/china\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=china\" class=\"term-link\" title=\"2 topics\">China<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"pgp\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/pgp\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=pgp\" class=\"term-link\" title=\"2 topics\">pgp<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Botnet\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/botnet\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=botnet\" class=\"term-link\" title=\"2 topics\">Botnet<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Root CA\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/root-ca\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=root-ca\" class=\"term-link\" title=\"2 topics\">Root CA<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jon Callas\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/jon-callas\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=jon-callas\" class=\"term-link\" title=\"2 topics\">Jon Callas<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Spies\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/spies\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=spies\" class=\"term-link\" title=\"2 topics\">Spies<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"secure communications\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/secure-communications\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=secure-communications\" class=\"term-link\" title=\"2 topics\">secure communications<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mass surveillance\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/mass-surveillance\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=mass-surveillance\" class=\"term-link\" title=\"2 topics\">Mass surveillance<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Postini\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/postini\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=postini\" class=\"term-link\" title=\"2 topics\">Postini<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Telcos\" data-taxonomy=\"Tags\" data-term-url=\"http:\/\/search.gigaom.com\/tag\/telcos\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?tag=telcos\" class=\"term-link\" title=\"2 topics\">Telcos<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-8\" class=\"facet-author widget widget_scriblio_facets\"><header class=\"widget-title\">Author<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"David Meyer\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/superglaze\/\"><span class=\"bar\" style=\"width:32.624113475177%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=superglaze\" class=\"term-link\" title=\"46 topics\">David Meyer<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>46<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jonathan Vanian\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/jonathanvanian\/\"><span class=\"bar\" style=\"width:13.475177304965%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-jonathanvanian\" class=\"term-link\" title=\"19 topics\">Jonathan Vanian<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>19<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Barb Darrow\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/barbdarrow\/\"><span class=\"bar\" style=\"width:12.056737588652%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-barbdarrow\" class=\"term-link\" title=\"17 topics\">Barb Darrow<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>17<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jeff Roberts\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/jeffr\/\"><span class=\"bar\" style=\"width:5.6737588652482%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-jeffr\" class=\"term-link\" title=\"8 topics\">Jeff Roberts<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>8<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Kevin Fitchard\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/kevinfitchard\/\"><span class=\"bar\" style=\"width:4.9645390070922%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-kevinfitchard\" class=\"term-link\" title=\"7 topics\">Kevin Fitchard<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>7<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Kevin C. Tofel\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/kevintofel\/\"><span class=\"bar\" style=\"width:2.8368794326241%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=kevintofel\" class=\"term-link\" title=\"4 topics\">Kevin C. Tofel<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>4<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Guest Column\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/gigaguest\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=gigaguest\" class=\"term-link\" title=\"3 topics\">Guest Column<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Lawrence M. Walsh (Larry Walsh)\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/larrywalsh\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-larrywalsh\" class=\"term-link\" title=\"3 topics\">Lawrence M. Walsh (Larry Walsh)<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"hrbrmstr\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/hrbrmstr\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-hrbrmstr\" class=\"term-link\" title=\"3 topics\">hrbrmstr<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Derrick Harris\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/dharrisstructure\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=dharrisstructure\" class=\"term-link\" title=\"3 topics\">Derrick Harris<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Josh Asch\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/jobbogamer\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-jobbogamer\" class=\"term-link\" title=\"3 topics\">Josh Asch<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Om Malik\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/om\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=om\" class=\"term-link\" title=\"2 topics\">Om Malik<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"chamilton\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/chamilton\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-chamilton\" class=\"term-link\" title=\"2 topics\">chamilton<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Lauren Hockenson\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/laurenhockenson1\/\"><span class=\"bar\" style=\"width:1.4184397163121%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-laurenhockenson1\" class=\"term-link\" title=\"2 topics\">Lauren Hockenson<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>2<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Stacey Higginbotham\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/staceyh\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-staceyh\" class=\"term-link\" title=\"1 topics\">Stacey Higginbotham<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jon Collins\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/joncollins\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-joncollins\" class=\"term-link\" title=\"1 topics\">Jon Collins<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Kif Leswing\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/kifleswing1\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-kifleswing1\" class=\"term-link\" title=\"1 topics\">Kif Leswing<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"April Kilcrease\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/aprilkilcrease\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-aprilkilcrease\" class=\"term-link\" title=\"1 topics\">April Kilcrease<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Dave Greenbaum\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/calldrdave\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-calldrdave\" class=\"term-link\" title=\"1 topics\">Dave Greenbaum<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Pedro Hernandez\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/pedrohernandez\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-pedrohernandez\" class=\"term-link\" title=\"1 topics\">Pedro Hernandez<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Laura Stuart\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/laurastuart\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-laurastuart\" class=\"term-link\" title=\"1 topics\">Laura Stuart<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Mathew Ingram\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/mathewi1\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-mathewi1\" class=\"term-link\" title=\"1 topics\">Mathew Ingram<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Simon Mackie\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/simonmackie\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-simonmackie\" class=\"term-link\" title=\"1 topics\">Simon Mackie<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Andrew Brust\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/andrewjbrust\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-andrewjbrust\" class=\"term-link\" title=\"1 topics\">Andrew Brust<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Jason Harris\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/techcraver\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-techcraver\" class=\"term-link\" title=\"1 topics\">Jason Harris<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Stowe Boyd\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/stowe\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=stowe\" class=\"term-link\" title=\"1 topics\">Stowe Boyd<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Geoffrey Goetz\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/ggeoffre\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=ggeoffre\" class=\"term-link\" title=\"1 topics\">Geoffrey Goetz<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Janko Roettgers\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/jankor\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-jankor\" class=\"term-link\" title=\"1 topics\">Janko Roettgers<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"David Card\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/davidcard\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-davidcard\" class=\"term-link\" title=\"1 topics\">David Card<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Keren Elazari\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/kerenelazari\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-kerenelazari\" class=\"term-link\" title=\"1 topics\">Keren Elazari<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Edit Staff\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/gigaedit\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-gigaedit\" class=\"term-link\" title=\"1 topics\">Edit Staff<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Ashar Baig\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/ashar\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-ashar\" class=\"term-link\" title=\"1 topics\">Ashar Baig<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Carmel DeAmicis\" data-taxonomy=\"Co-Authors\" data-term-url=\"http:\/\/search.gigaom.com\/author\/carmeldee88\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/technology\/encryption\/?authors=cap-carmeldee88\" class=\"term-link\" title=\"1 topics\">Carmel DeAmicis<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-3\" class=\"facet-post-type widget widget_scriblio_facets\"><header class=\"widget-title\">Content Type<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"News Post\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/news-post\/\"><span class=\"bar\" style=\"width:81.560283687943%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/go-type\/news-post\/?technology=encryption\" class=\"term-link\" title=\"115 topics\">News Post<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>115<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Report\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/report\/\"><span class=\"bar\" style=\"width:4.2553191489362%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/go-type\/report\/?technology=encryption\" class=\"term-link\" title=\"6 topics\">Report<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"News Post\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/blog-post\/\"><span class=\"bar\" style=\"width:2.1276595744681%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/go-type\/blog-post\/?technology=encryption\" class=\"term-link\" title=\"3 topics\">News Post<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>3<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"audio\" data-taxonomy=\"Post Type\" data-term-url=\"http:\/\/search.gigaom.com\/go-type\/audio\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/go-type\/audio\/?technology=encryption\" class=\"term-link\" title=\"1 topics\">audio<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-5\" class=\"facet-property widget widget_scriblio_facets\"><header class=\"widget-title\">Property<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Gigaom\" data-taxonomy=\"Property\" data-term-url=\"http:\/\/search.gigaom.com\/property\/gigaom\/\"><span class=\"bar\" style=\"width:80.851063829787%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/property\/gigaom\/?technology=encryption\" class=\"term-link\" title=\"114 topics\">Gigaom<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>114<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Research\" data-taxonomy=\"Property\" data-term-url=\"http:\/\/search.gigaom.com\/property\/research\/\"><span class=\"bar\" style=\"width:7.8014184397163%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/property\/research\/?technology=encryption\" class=\"term-link\" title=\"11 topics\">Research<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>11<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"paidContent\" data-taxonomy=\"Property\" data-term-url=\"http:\/\/search.gigaom.com\/property\/paidcontent\/\"><span class=\"bar\" style=\"width:0.70921985815603%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/property\/paidcontent\/?technology=encryption\" class=\"term-link\" title=\"1 topics\">paidContent<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>1<\/span><\/a><\/li>\n<\/ul>\n<\/div><div id=\"scriblio_facets-10\" class=\"facet-availability widget widget_scriblio_facets\"><header class=\"widget-title\">Access<\/header><ul class='wp-tag-cloud'>\n\t<li class=\"\" data-term=\"Free\" data-taxonomy=\"Availability\" data-term-url=\"http:\/\/search.gigaom.com\/availability\/free\/\"><span class=\"bar\" style=\"width:95.744680851064%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/availability\/free\/?technology=encryption\" class=\"term-link\" title=\"135 topics\">Free<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>135<\/span><\/a><\/li>\n\t<li class=\"\" data-term=\"Subscription\" data-taxonomy=\"Availability\" data-term-url=\"http:\/\/search.gigaom.com\/availability\/subscription\/\"><span class=\"bar\" style=\"width:4.2553191489362%;\"><\/span><a href=\"http:\/\/search.gigaom.com\/availability\/subscription\/?technology=encryption\" class=\"term-link\" title=\"6 topics\">Subscription<span class=\"count\"><span class=\"meta-sep\">&nbsp;<\/span>6<\/span><\/a><\/li>\n<\/ul>\n<\/div>";
