encryption   39596

« earlier    

Enigmail - Thunderbird Mail DE
Enigmail integriert OpenPGP-Verschlüsselung und Authentifizierung in Thunderbird und andere Mozilla-basierten E-Mail-Programme (wie SeaMonkey und Postbox). Dabei stellt Enigmail die Benutzeroberfläche zur Verfügung, während die Verschlüsselung selbst von GnuPG im Hintergrund vorgenommen wird.
thunderbird  enigmail  gnugpg  mail  encryption  security 
22 hours ago by ritzlea
Exclusive: Chat is Google’s next big fix for Android’s messaging mess - The Verge
But remember, Chat is a carrier-based service, not a Google service. It’s just “Chat,” not “Google Chat.” In a sign of its strategic importance to Google, the company has spearheaded development on the new standard, so that every carrier’s Chat services will be interoperable. But, like SMS, Chat won’t be end-to-end encrypted, and it will follow the same legal intercept standards. In other words: it won’t be as secure as iMessage or Signal.
privacy  encryption  lame 
yesterday by craniac
Encryption 101: a malware analyst's primer - Malwarebytes Labs | Malwarebytes Labs
While most in the security industry know what encryption is, many lack a basic understanding of how it is used in malware—especially ransomware. Because of this, we thought it would be beneficial to do an introductory primer on encryption mechanisms and how they are exploited for malicious purposes.
We will start with a introduction to encryption in general, and follow up with the main methods used to encrypt files used by ransomware. In part two of this blog series, we’ll use a recent ransomware variant detected by Malwarebytes as Ransom.ShiOne to highlight the key weaknesses in encryption to look out for when trying to decrypt files.
What is encryption?
In the simplest of terms, encryption is the process of encoding information so that only authorized parties can access it, and those who are not authorized cannot. In computing, encryption is the method by which data is converted from a readable format (plaintext) to an encoded one (ciphertext) that can only be decoded by another entity if they have access to a decryption key. While encryption was long used by the military to facilitate secret communication, today it is used to secure data in transit and in storage, as well as to authenticate and verify identities.
Unfortunately, encryption is also used for malicious purposes, as is the case with ransomware.
security  privacy  encryption  101  malware 
yesterday by rgl7194
Apple’s New iMac Pro Delivers Enhanced Security with the T2 Chip | The Mac Security Blog
Have you seen the new iMac Pro? What a beast! With a gorgeous 5K display, up to 18 cores of CPU goodness and slick AMD Radeon Vega graphics options, the iMac Pro is a serious contender in the pro market. For those interested in Mac security, what's particularly noteworthy in Apple's new iMac Pro is a dedicated chip called the T2.
In Apple's own words, the T2 does the following:
Introducing the Apple T2 chip, our second-generation custom Mac silicon. By redesigning and integrating several controllers found in other Mac systems — like the system management controller, image signal processor, audio controller, and SSD controller — T2 delivers new capabilities to the Mac. For instance, the T2 image signal processor works with the FaceTime HD camera to enable enhanced tone mapping, improved exposure control, and face detection–based auto exposure and auto white balance. T2 also makes iMac Pro even more secure, thanks to a Secure Enclave coprocessor that provides the foundation for new encrypted storage and secure boot capabilities. The data on your SSD is encrypted using dedicated AES hardware with no effect on the SSD’s performance, while keeping the Intel Xeon processor free for your compute tasks. And secure boot ensures that the lowest levels of software aren’t tampered with and that only operating system software trusted by Apple loads at startup.
imac_pro  security  chip  encryption 
yesterday by rgl7194
duplicity: Main
coolio: "Encrypted bandwidth-efficient backup using the rsync algorithm"
encryption  cool  code  project  programming 
yesterday by teffalump
ankane/kms_encrypted: Simple, secure key management for attr_encrypted
This uses KMS to manage encryption keys and attr_encrypted to do the encryption.
security  encryption 
yesterday by stympy
GrayKey iPhone unlocker poses serious security concerns - Malwarebytes Labs | Malwarebytes Labs
Ever since the case of the San Bernadino shooter pitted Apple against the FBI over the unlocking of an iPhone, opinions have been split on providing backdoor access to the iPhone for law enforcement. Some felt that Apple was aiding and abetting a felony by refusing to create a special version of iOS with a backdoor for accessing the phone’s data. Others believed that it’s impossible to give backdoor access to law enforcement without threatening the security of law-abiding citizens.
In an interesting twist, the battle ended with the FBI dropping the case after finding a third party who could help. At the time, it was theorized that the third party was Cellebrite. Since then it has become known that Cellebrite— an Israeli company—does provide iPhone unlocking services to law enforcement agencies.
iphone  security  privacy  encryption  hack  ios 
yesterday by rgl7194
Daring Fireball: GrayKey iPhone Unlocker Poses Serious Security Concerns
Thomas Reed, writing for the Malwarebytes Labs blog...
So the phone is only connected to the box for two minutes, and then the phone itself displays the passcode after it’s cracked? If I’m reading this right, the box must jailbreak the iPhone and install the cracking software on the iPhone itself. I guess that would explain how they get around iOS’s (optional) wipe-after-10-wrong-guesses feature, as well as the escalating delays after a few wrong guesses.
Hopefully Apple can figure out how to fix this jailbreak. If you’re concerned about this, you ought to switch to a stronger alphanumeric passphrase.
daring_fireball  iphone  security  privacy  encryption  hack  ios 
yesterday by rgl7194
PFS / Letsencrypt for Postfix/Dovecot/PureFTPd | Howtoforge - Linux Howtos and Tutorials
If you have your hosts FQDN in ISPConfig and made a valid Letsencrpyt-Cert for it, you can use it for mail, too.

make changes to /etc/postfix/main.cf...
letsencrypt  mail  email  postfix  sysadmin  encryption  certificates 
3 days ago by rdump

« earlier    

related tags

00000  101  1_app  2018  2_freeware  3_both  4_helpertools  4_security  7_encryption  administration  adversary  android  apache  apple  apr18  architecture  archive  ask  audio  auth0  authentication  aws  backdoor  backup  bash  beat  bluetooth  browser  certificate  certificates  change  chat  chip  chrome  cli  cloud  cloudflare  code  command_line  communication  congress  cool  crate  credentials  creds  crypto  cryptography  daring_fireball  data  decoding  decryption  development  disk  dns  documents  drop  dropbox  dubsteg  dubstep  email  embedded  encoding  encrypted  encryptionwars  enigmail  event-sourcing  evil  example  excel  facebook  fbi  file  fingerprint  font  free  fun  funny  gdpr  gem  git  github  glassfish  gmail  gnugpg  go  gog  golang  google  gpg  hack  hackaday  hosting  how-to  howto  https  ifttt  imac_pro  infosec  internet  ios  iphone  isdp  isp.adversaries  java  jwt  kafka  keystore  lame  ledger  letsencrypt  library  linux  lockscreen  luks  lying  macos  mail  malware  matthewgreen  mbedtls  migration  mpc  music  net.neutrality  network  openbsd  openoffice  opensmtpd  opensource  osx  oversight  passcode  password  pgp  plugin  police  postfix  privacy  programing  programming  project  protection  python  qr  reference  reversing  rsync  ruby  rust  s3  s_mime  sct  seald  secret  secure  security  selinux  server  service  sig  signal  signature  sms  smtpd  software  solutions  spreadsheet  ssh  ssl  steganography  storage  synology  sysadmin  t  tappit  technology  thunderbird  tls  tool  tools  toread  tracking  tutorial  ubuntu  unread  updates  web  webdev  whatsapp  wordpress  zk-snark  zsh 

Copy this bookmark: