高华气象

CEO Blog

A virtual club to communicate with peers and users in the cryptographic industry
Meet friends on blog, it is my mission to popularize cryptographic knowledge, cryptographic application and zero trust ideas.

  • Recommended
  • 密码讲堂
  • 商密生态
  • 网站安全
  • 邮件安全
  • 文档安全
  • 零信浏览器
  • 数字证书
  • 身份可信
  • 零信任
  • 市场简报
  • 其它话题
  • E-contract and E-mail, Two in One

    E-contract and E-mail, Two in One

    This article discusses how electronic contracts and emails can be combined into one. Users can use ZT Browser to complete the digital signing of electronic contracts with one click when sending emails. This is simpler than signing contracts on traditional e-contract signing platforms that no need to upload the original contract document, and it can better protect the security of users' contract confidential information. It is also completely free.

    November 25, 2024Read more
    The day email encryption becomes commonplace is the day fraud emails die

    The day email encryption becomes commonplace is the day fraud emails die

    Fraud emails have caused a global loss of $55.5 billion over the past decade. This article proposes a complete solution to eradicate email fraud - popularizing email encryption application. This article also shows how ZT Browser UI specifically displays email identity information, which effectively prevents email fraud.

    November 14, 2024Read more
    How does ZT Browser automate the implementation of trusted email timestamping service?

    How does ZT Browser automate the implementation of trusted email timestamping service?

    This article discloses in advance the email timestamping service provided by ZT Browser innovation in the world, so that every email sent by ZT Browser can automatically realize the trusted proof of email sending time like regular mail has a postmark proof.

    November 11, 2024Read more
    How does ZT Browser automate key management?

    How does ZT Browser automate key management?

    The third challenge of S/MIME email encryption is key management, this article discloses how ZT Browser automates key management, and only by automatically managing keys can email encryption be truly automated.

    November 07, 2024Read more
    How does ZT Browser automate public key exchange?

    How does ZT Browser automate public key exchange?

    The second difficulty of S/MIME email encryption is public key exchange. This article discloses how ZT Browser realizes the automation of public key exchange. Only by realizing automatic exchange of public keys can email encryption automation be truly realized.

    November 04, 2024Read more
    How does ZT Browser realize the automatic email certificate management?

    How does ZT Browser realize the automatic email certificate management?

    This article explains how ZoTrus Technology realizes automatic email certificate management, only by automatically configuring email certificates can automatic-email-encryption be realized, and only by popularizing email encryption can we ensure the security of email content in transit and in the cloud.

    October 30, 2024Read more
    Cloud and Privacy Can Be Both

    Cloud and Privacy Can Be Both

    This article reveals in advance how the ZT Browser Email Encryption Service uses email encryption technology to protect the confidential information of users' address books, cleverly solving the contradiction between cloud services and privacy protection, allowing both to be achieved.

    October 28, 2024Read more
    Email encryption still has a long way to go with a heavy load

    Email encryption still has a long way to go with a heavy load

    This article summarizes the advantages and disadvantages of various email encryption solutions and reviews the author's 20 years of email encryption research. The author hope that readers will have a clear understanding of email encryption technology and choose the right email encryption solution.

    October 22, 2024Read more
    Email is bound to become a core application of Web 3.0

    Email is bound to become a core application of Web 3.0

    This article summarizes the development history of the Web and draws an important conclusion: Email will become a core application of Web 3.0, and to achieve this goal, email encryption automation is the key.

    October 16, 2024Read more
    Only by Automating End-to-End Encryption Can Truly ensure Email Security

    Only by Automating End-to-End Encryption Can Truly ensure Email Security

    This article explains what true end-to-end encryption is and what kind of end-to-end encryption users should choose to truly protect the security of their email confidential information. This article also briefly introduces the upcoming ZoTrus email encryption automation solution.

    October 11, 2024Read more
    Email Needs Zero Trust

    Email Needs Zero Trust

    4 billion emails are sent worldwide every month, 90% of cyberattacks start with phishing emails, 97% of people cannot accurately identify phishing email scams, and Gmail blocks more than 100 million phishing emails every day. What do these data means?

    October 09, 2024Read more
    HTTPS encryption automation and email encryption automation

    HTTPS encryption automation and email encryption automation

    This article summarizes the work done by ZoTrus Technology in HTTPS encryption automation. The next hot spot for cryptographic applications will be email encryption automation. This article also clarifies the relationship between HTTPS encryption automation and email encryption automation and the different missions they accomplish.

    September 29, 2024Read more