Summary of How to Encrypt Your Entire Life in Less than an Hour

Looking for the article?
We have the summary! Get the key insights in just 5 minutes.

How to Encrypt Your Entire Life in Less than an Hour summary
Start getting smarter:
or see our plans


8 Overall

10 Applicability

7 Innovation

8 Style


Today, most people store the trappings of everyday life – personal conversations, photos, financial information – digitally, making them vulnerable to attack. All Internet users must protect themselves using encryption. Fortunately, encryption is easy to implement across multiple websites and devices. Software engineer and teacher Quincy Larson lists eight ways that you can quickly secure your data. For more procedural tips, Larson neatly summarizes steps with screenshots for ease of understanding. While getAbstract always recommends you do further research when it comes to your security, this article serves as an excellent primer to anyone looking for ways to protect themselves online.

In this summary, you will learn

  • How to secure your email inbox and cellphone from malicious individuals,
  • How to browse the web privately, and
  • How to have private conversations online.

About the Author

Quincy Larson teaches and blogs at Free Code Camp, an online open source e-learning community for computer programming students.



To protect your data and your identity, follow eight quick and easy steps for encryption: Emails – Your email is the account you need to protect the most, as it likely contains personal and financial information. With access to your inbox, a malicious individual can use password...

More on this topic

By the same author

The Future of the Open Internet – and Our Way of Life – Is in Your Hands

Customers who read this summary also read

Forget Apple vs. the FBI
Nothing Can Stop Google. DuckDuckGo Is Trying Anyway.
The 13-Step Digital Declutter
The Malicious Use of Artificial Intelligence
The SEO Tips That Helped Tally 20 Million Visits A Month
Europe's New Privacy Law Will Change the Web, and More

Related Channels

Comment on this summary