encryption   40432

« earlier    

The Security in Secure Digital - How Secure Digital Memory Cards Work | HowStuffWorks
SD Cards include a facility for encrypting the data on the card. This was designed to allow SD cards to be used for distributing media that could not be copied – e.g. distributing music or video that could not be copied. Hence the ‘secure’ part of the name.

This functionality does not seem to have been widely adopted – distribution of digital data through physical means is decidedly old-think. It’s like Blu-ray – overtaken by network distribution.

Some Android phones allow encryption of the personal data held on SD cards.
storage  security  encryption 
2 days ago by metaproof
End-to-End Encrypted Cloud Storage for Businesses | Tresorit
End-to-End Encrypted File Sync & Sharing
Tresorit is the ultra secure place in the cloud to store, sync and share files easily from anywhere, anytime.
gdpr  sync  storage  data  encryption  services 
2 days ago by vesan
Let’s talk about PAKE – A Few Thoughts on Cryptographic Engineering
The first rule of PAKE is: nobody ever wants to talk about PAKE. The second rule of PAKE is that this is a shame, because PAKE — which stands for Password Authenticated Key Exchange — is actually one of the most useful technologies that (almost) never gets used. via Pocket
IFTTT  Pocket  cryptography  encryption  password  security 
3 days ago by ChristopherA
FBI security expert: Apple are “jerks” about unlocking encrypted phones | Ars Technica
"Apple is pretty good at evil genius stuff," FBI official laments at conference.
Federal Bureau of Investigation officials are continuing to voice their displeasure with Apple's approach to iPhone security, with one FBI official reportedly calling the company "jerks" and an "evil genius" this week.
Apple has repeatedly made it more difficult to access data on encrypted iPhones, making Apple customers safer from hackers but also preventing the FBI from breaking into phones used by suspected criminals.
"At what point is it just trying to one-up things and at what point is it to thwart law enforcement?" FBI forensic expert Stephen Flatley said yesterday while speaking at the International Conference on Cyber Security in Manhattan, according to a report by Motherboard. "Apple is pretty good at evil genius stuff."
apple  privacy  security  encryption  gov2.0  politics  FBI  iphone 
4 days ago by rgl7194
FBI expert calls Apple "jerks" over encryption - Six Colors
Ars Technica’s Jon Brodkin:
“At what point is it just trying to one-up things and at what point is it to thwart law enforcement?” FBI forensic expert Stephen Flatley said yesterday while speaking at the International Conference on Cyber Security in Manhattan, according to a report by Motherboard. “Apple is pretty good at evil genius stuff.”
Flatley also used the word “jerks” to describe Apple and its approach to iPhone security, according to Motherboard.
I guess it’s like the old saying goes: one person’s “evil genius” is another’s “champion of personal privacy.”
apple  privacy  security  encryption  gov2.0  politics  FBI  iphone 
4 days ago by rgl7194
Let’s Encrypt takes free “wildcard” certificates live | Ars Technica
In a victory for securing Web, anybody can now get a certificate valid for every site in a domain.
In July of 2017, the nonprofit certificate authority Let's Encrypt promised to deliver something that would put secure websites and Web applications within reach of any Internet user: free "wildcard" certificates to enable secure HTTP connections for entire domains. Today, Let's Encrypt took that promised service live, in addition to a new version of the Automated Certificate Management Environment (ACME) protocol, an interface that can be used by a variety of client software packages to automate verification of certificate requests.
ACME version 2 "has gone through the IETF standards process," said Josh Aas, executive director of the Internet Security Research Group (ISRG), the group behind Let's Encrypt, in a blog post on the release. ACME v2 is currently a draft Internet Engineering Task Force standard, so it may not yet be in its final form. But the current version is the result of significant feedback from the industry. And its use is required to obtain wildcard certificates.
security  privacy  encryption  HTTP/S  free  internet 
4 days ago by rgl7194

« earlier    

related tags

1.2  2018  40s  _hot_  aadmm  aggregated  android  angular2  anonymity  ansible  app  apple  apps  arc  article  authentication  authority  automated  automatic  automation  aws  azure  azuread  backup  bitcoin  bitlocker  bittorrent  bleepingcomputer  blockchain  blog  books  browser  business  capitalism  cartoon  cdn  cerbot  certificate  chat  cheap  cheatsheet  checker  chrome  client  cloud  collaboration  communications  comparison  compliance  computers  computing  confidential  connecting  cool  coolstuff  crossplatform  cryptography  cryptor  data  database  deletefacebook  demo  desktop  development  devops  disk  distributed  diy  dns  docker  doh  drive  during  e2e  ecdsa  editing  email  ems  encrypt  esp32  example  examples  extensions  fbi  filesharing  firefox  five_eyes  free  gdpr  gem  github  gnupg  go  golang  gov2.0  gpg  haha  harddisk  harddrive  homomorphic  howto  http/s  https  ifttt  infosec  intelligence  internet  ios  iot  iphone  ipv6  it-security  javascript  keychain  keys  kraken  legal  lernherausforderung  letsencrypt  library  linux  login  mac  macos  mail  management  markdown  math  media  messaging  mobile  mount  mt  name  network  networking  nginx  notes  open-source  openbsd  opensource  openssh  osx  outlook  owa  p2p  passphrase  password-management  password  passwords  personal  pgp  php  piracy  pocket  politics  privacy  productivity  projects  protocol  query  rails  ransomware  raspberrypi  recommended  reference  research  review  rsa  safari  salt  secure  security  self  served  server  service  services  sharing  shell  smime  social  software  ssh  ssl  storage  sync  sysadmin  team  text  theory  tls  tls1.2  to  tooled  tools  top  tor  transport  truecrypt  tsl  tunnel  tutorial  tv  ubuntu  uk  usb  use  vault  vf  via_df  visualization  voip  volume  webcomic  webdev  whiteboard  windows  women  writing  wwii  xkcd  zfs 

Copy this bookmark:



description:


tags: