end-to-end encryption

See the following -

An Android Operating System That Prioritizes Mobile Data Privacy

Android and iOS devices are notorious for uploading your personal data to their cloud services without your permission. If you are concerned about your mobile data privacy, you have another option to consider for your next smartphone: the /e/ operating system, a free and open source, Android-based operating system. The eFoundation community is led by Gaël Duval, a legacy Linux developer and entrepreneur who founded Mandrake Linux in 1998.

Read More »

Germany's Healthcare System Is Using This Open Source Standard For Encrypted Instant Messaging

Daphné Leprince-Ringuet | ZDNet | July 23, 2021

A fast-growing open communication platform has been picked by the German healthcare system to support instant messaging between health professionals and organizations across the country. Called Matrix, the platform will provide German developers with the infrastructure, tools and protocols to build custom-made applications that will let up to 150,000 healthcare organizations securely share messages, data, images and files.

Read More »

HHS Announces the Move Health Data Forward Phase 2 Challenge Winners

Press Release | U.S. Department of Health and Human Services | February 21, 2017

The Department of Health and Humans Services’ Office of the National Coordinator for Health Information Technology (ONC) today announced the Phase 2 winners of the Move Health Data Forward Challenge. Winning submissions will now move on to the challenge’s last phase to develop applications that will allow individuals to share their personal health information safely and securely with their health care providers, family members or other caregivers...

Who Controls Your Smartphone? And How to Leverage Open Source to Prevent it from Spying on You

There are many things about today’s world that warrant us asking that question. Do you or the mobile vendor control your smartphones? If you are a consumer, small or medium business (SMB) -- the answer is the vendor...What if you are a large enterprise or a government agency? The answer is still the vendor...How can the user regain control? Not all vendors have locked devices and walled gardens. Google’s line of Pixel hardware, for example, is a mid-market solution whose bootloader allows locking and re-locking. Pixels support two versions of Android. Google Mobile Services (GMS), where free services are tied to data monetization and a UX like Apple and Samsung devices. Secondly, Pixels can run Android Open-Source Project (AOSP) code that shares the same strengths as the GMS build, but the customer controls the code base and updates. There are several companies that are selling AOSP operating system builds for Pixel and other unlockable/lockable mobile phones and tablets...

Read More »