2569
CryptoParty
CryptoParty is a decentralized movement with events happening all over the world. The goal is to pass on knowledge about protecting yourself in the digital space. This can include encrypted communication, preventing being tracked while browsing the web, and general security advice regarding computers and smartphones.
security  privacy  GnuPG  gpg  PGP  cryptography 
7 days ago
operational pgp - draft
This is a guide on how to email securely.
email  encryption  gpg  security  GnuPG 
20 days ago
OpenPGP Best Practices - riseup.net
We have gathered here a lot of information about configuring GnuPG. There are detailed explanations for each configuration suggestion. Many of these changes require you to make changes to the GnuPG configuration file on your machine located at ~/.gnupg/gpg.conf. For your convenience, all the suggested changes to the gpg.conf file are gathered in one place near the bottom of this page. We strongly encourage you to not blindly copy the file, but read the document and understand what the settings do.

Also note that this guide was written for legacy versions of GnuPG (1.4) and may contain recommendations that are redundant with default settings in newer releases of GnuPG (2.1 and above). A review is in progress to make sure the guide is up to date. You can help by submitting changes yourself.
gpg  GnuPG  security  crittografia  privacy 
20 days ago
drduh/YubiKey-Guide: Guide to using YubiKey as a SmartCard for GPG and SSH
This is a practical guide to using YubiKey as a SmartCard for storing GPG encryption and signing keys.
An authentication key can also be created for SSH and used with gpg-agent.
Keys stored on a smartcard like YubiKey seem more difficult to steal than ones stored on disk, and are convenient for everyday use.
gpg  GnuPG  SSH  YubiKey  security 
28 days ago
Using GPG and SSH keys (GnuPG 2.1) with a Smartcard (Yubikey 4) - Suva.sh's blog
The primary intention of this post is to document the research and the steps I’ve taken for my current ‘GPG & SSH keys on a smartcard’ setup, so that I can look it up for future reference and possible improvements. There are plenty of good articles around the same subject, but most of them are partly dated either regarding GnuPG versions, subkey separation or an older Yubikey.
gpg  GnuPG  SSH  YubiKey  security 
28 days ago
La sonda Cassini non esiste più - Il Post
Intorno alle 12:30 si è polverizzata nell'atmosfera di Saturno a 1,5 miliardi di chilometri da noi, dopo 20 anni di onoratissimo servizio.
science  space 
8 weeks ago
Roombas will Spy on You
The company that sells the Roomba autonomous vacuum wants to sell the data about your home that it collects.
Roomba  IoT  security  privacy 
july 2017
La mafia del fuoco: pressioni alla politica e affari dei clan, ecco perché l’Italia sta bruciando - Repubblica.it
Dietro gli incendi non c’è un disegno eversivo o una regia unica. Ma una serie di ragioni che mettono lo Stato in ginocchio. Si evocano piani eversivi per nascondere la realtà dei territori abbandonati. È la bonifica criminale per eccellenza: con le fiamme si fa spazio a discariche e ad aree in cui si potrebbe stoccare di tutto. Il territorio è in balìa di se stesso senza alcuna seria possibilità di prevenzione, previsione, monitoraggio e intervento.
Saviano  incendi  criminalità  letture 
july 2017
Spectral is a Font That’s Interactive & Customisable
While fonts come in many forms, most, if not all of them, are usually static in design. However, fonts may soon become a lot more flexible as Google has introduced a new font type that is both customizable and interactive – called Spectral.
fonts 
july 2017
Australia Considering New Law Weakening Encryption - Schneier on Security
Never mind that the law 1) would not achieve the desired results because all the smart "terrorists and drug traffickers and pedophile rings" will simply use a third-party encryption app, and 2) would make everyone else in Australia less secure. But that's all ground I've covered before.
security  encryption  Australia 
july 2017
Estrarre dati da dischi NTFS danneggiati – Andrea Lazzarotto
L’analisi dei file system è una parte molto importante dell’attività di digital forensics. Molte indagini riguardano dischi rigidi il cui contenuto deve essere analizzato. In alcuni casi, anche i file eliminati potrebbero dover essere recuperati. Ci sono diversi tipi di file system e NTFS è attualmente uno dei più popolari.
harddisk  data  recovery 
july 2017
Orologio per scacchi DGT2010 - L'orologio ufficiale della FIDE
L`orologio DGT è l`orologio ufficiale omologato dalla Federazione Scacchistica Internazionale, ed è utilizzato nei tornei ad alto livello di tutto il mondo, poiché è impostabile con le nuove cadenze di gioco ad incremento - oltre a consentire quelle tradizionali.
Scacchi  wishlist 
july 2017
Completo scacchi piombati + scacchiera da torneo con borsa
Completo da torneo scacchi doppio piombo+scacchiera+borsa, prezzo imbattibile!
Scacchi  wishlist 
july 2017
Analfabeti funzionali, il dramma italiano: chi sono e perché il nostro Paese è tra i peggiori - l'Espresso
Sono capaci di leggere e scrivere, ma hanno difficoltà a comprendere testi semplici e sono privi di molte competenze utili nella vita quotidiana. Nessuna nazione in Europa, a parte la Turchia, ne conta così tanti. Tutti i numeri per capire la dimensione di un fenomeno spesso sottovalutato.
analfabetismo_funzionale  letture 
july 2017
Secure Salted Password Hashing - How to do it Properly
If you're a web developer, you've probably had to make a user account system. The most important aspect of a user account system is how user passwords are protected. User account databases are hacked frequently, so you absolutely must do something to protect your users' passwords if your website is ever breached. The best way to protect passwords is to employ salted password hashing. This page will explain why it's done the way it is.
password  hashing  cryptography  security 
july 2017
NarcoRoma, la nuova capitale della cocaina - Repubblica.it
La città trasformata nella centrale internazionale del traffico di droga. Gestito da gruppi criminali romani, in affari con i boss della ‘ndrangheta e della camorra. Un business straordinario che permette di raccogliere con un solo carico un miliardo e 300 milioni di euro: più del valore in Borsa di Roma e Juventus. Il procuratore Pignatone: la rotta che parte dalla Capitale ha come obiettivo l'intera Europa.
Saviano  Roma  criminalità  narcotraffico  letture 
july 2017
Why we still recommend Signal over WhatsApp ...even though they both use end-to-end encryption
WhatsApp's collaboration with Open Whisper Systems recently brought end-to-end encryption to the lives of a billion people around the world. (Open Whisper Systems develops Signal, an open source mobile messaging and VoIP app.) When WhatsApp integrated the encryption protocol developed for Signal, many of us began using end-to-end encryption without even realizing it.

Undoubtedly, this is an exciting and important development that will help protect the privacy of users all over the world. In this post, however, we would like to explain why we recommend Signal over WhatsApp, even though they both use the same protocol for end-to-end encryption.
WhatsApp  Signal  messaging  privacy  security 
july 2017
Custom Fields vs. Custom Taxonomies, when to (not) use? - Meta Box
Another question that I usually see developers are confused is when to use custom fields and when to use custom taxonomies? Should I use a taxonomy instead of a custom field or vise versa? Assume that you have a custom post type “Book” and you want to store publisher name. Will you store it as a custom field or a taxonomy?
wordpress  custom-taxonomies  custom-fields  webdev 
july 2017
How to 301 Redirect a WordPress Site
I find working as a WordPress developer to be relatively low-stress. Giving people a beautiful web presence is both a huge service, and something that doesn’t lead to massive tragedy if you’re not perfect at it right away. It’s not like being a fireman or a fighter pilot, for example.

There are exceptions, though: a few times when I’ve been so stressed-out and guilt-ridden that I’ve felt like quitting my job. What’s more, they’re all the same kind of exception.
WordPress  redirect  from pocket
july 2017
Famed Hacker Kevin Mitnick Shows You How to Go Invisible Online
If you’re like me, one of the first things you do in the morning is check your email. And, if you’re like me, you also wonder who else has read your email. That’s not a paranoid concern. If you use a web-based email service such as Gmail or Outlook 365, the answer is kind of obvious and frightening.
Mitnick  privacy  security  from pocket
july 2017
Tales Of Job Burnout: How To Fix The Aftermath Of An Overachiever Attitude
Lately, it feels like if you’re not working 80-hour weeks, you’re not working hard enough. The willingness to work long hours in the hopes of rapid career growth has a name, and it’s not spelled B-O-S-S. Chronic overachievers often rely on a “I can do it all” attitude to feel accomplished and secure in their jobs. But what this attitude doesn’t rely on is reality. When you try to do everything all the time, you’re mostly likely to only achieve one thing: burnout.
job  burnout  from pocket
july 2017
What the Repeal of Online Privacy Protections Means for You
Congress on Tuesday moved to dismantle online privacy rules created during the Obama era. The rules, which were scheduled to take effect this year, would have required internet providers to get permission before collecting and selling a customer’s online information, including browsing activities.
privacy  security  from pocket
july 2017
Five Creepy Things Your ISP Could Do if Congress Repeals the FCC’s Privacy Protections
Why are we so worried about Congress repealing the FCC’s privacy rules for ISPs? Because we’ve seen ISPs do some disturbing things in the past to invade their users’ privacy. Here are five examples of creepy practices that could make a resurgence if we don’t stop Congress now.
FCC  data  ISP  privacy  from pocket
july 2017
Nearly One Million Systems Provide "Guest" SMB Access, Most Are Linux
There are 2,306,820 devices connected to the Internet at the moment that feature open ports for SMB services, the same protocol that was used to infect hundreds of thousands of computers with the WannaCry ransomworm a month ago.
Linux  Samba  security  SMB  WannaCry  from pocket
july 2017
WikiLeaks rivela Cherry Blossom, il malware della Cia per compromettere i router
Sono operativi che conducono missioni in tutto il mondo con licenza di uccidere, supportati anche da cyber armi create nei loro laboratori, ma tra killer e nerd, sembrano avere anche slanci romantici, tanto da chiamare uno dei loro programmi Cherry Blossom, ovvero fior di ciliegio. Cherry Blossom, in realtà, di poetico e gentile ha ben poco: è un micidiale programma segreto messo a punto dalla Cia nel 2004, ma che è andato avanti almeno fino al 2012 e non è escluso che sia ancora in corso, considerato quanto longevo e ambizioso.
malware  router  security  WikiLeaks  from pocket
july 2017
How Spammers, Superstars, and Tech Giants Gamed Music
Some of the ways artists are hacking the music-streaming service Spotify.
Spotify  hacking  music 
july 2017
Git Flow: come funziona aka Back to the future - Bitbull
I sistemi di controllo di versione consentono di tenere traccia delle modifiche fatte nel tempo e di collaborare più efficacemente all’interno di team composti da molte persone in particolare se, come in Bitbull, lavorano da remoto.
Non ci addentreremo nella spiegazione di che cos’è un sistema di controllo di versione, ma bensì vedremo come gestire al meglio il flusso di sviluppo con Git, il software di controllo versione distribuito.
Git  git-flow  development 
june 2017
git-flow cheatsheet
Branching efficiente usando git-flow realizzato da Vincent Driessen
Git  git-flow  development 
june 2017
7-Year-Old Samba Flaw Lets Hackers Access Thousands of Linux PCs Remotely
A 7-year-old critical remote code execution vulnerability has been discovered in Samba networking software that could allow a remote attacker to take control of an affected Linux and Unix machines.
security  Samba 
may 2017
WannaCry Ransomware: Everything You Need To Know Immediately
The only positive thing about this attack is that — you are here — as after reading this easy-to-understandable awareness article, you would be so cautious that you can save yourself from WannaCry, as well as other similar cyber attacks in the future.
security  malware  ransomware 
may 2017
Journey to the centre of the Earth | Visual.ly
How far would you have to travel to reach the Earth's core? And what would you see along the way? Discover what lies beneath...
science 
may 2017
Installing Neon on top of Kubuntu without reinstall • KDE Community Forums
So I have decided to install Neon on top of my Kubuntu-16.04 (+ backports PPA + libreoffice PPA).
KDE  KDE-Neon  Kubuntu 
may 2017
How to upgrade kubuntu 16.04 -> KDE neon
How to upgrade kubuntu 16.04 -> KDE neon
KDE  KDE-Neon  Kubuntu 
may 2017
Cronaca di un attacco di ransomware: in chat con i criminali
Quello che segue è un racconto di un grave attacco informatico a un'azienda che ho seguito personalmente come giornalista, arrivando a dialogare con gli aggressori, ma è soprattutto un promemoria del fatto che storie come questa possono capitare a chiunque e dovunque e hanno conseguenze pesanti per chi non fa prevenzione.
malware  ransomware 
april 2017
A successful Git branching model » nvie.com
In this post I present the development model that I’ve introduced for some of my projects (both at work and private) about a year ago, and which has turned out to be very successful. I’ve been meaning to write about it for a while now, but I’ve never really found the time to do so thoroughly, until now. I won’t talk about any of the projects’ details, merely about the branching strategy and release management.
Git  workflow  development  programming 
april 2017
Redirect Query String via .htaccess
This quick tutorial aims to clear up any confusion and explains how to redirect any URL based on its query string.
Apache  redirect 
april 2017
Wikileaks CIA Files - What this means for Internet security and encryption - ProtonMail Blog
Earlier today, Wikileaks dumped a large database of secret documents from the CIA in a released dubbed #Vault7. Here we do a deeper analysis of the leak and the broader implications on online security and encrypted services.
security  encryption  wikileaks  cia  leaks 
march 2017
"Proof Mode" for your Smartphone Camera
ProofMode is an app for your smartphone that adds data to the photos you take to prove that they are real and unaltered
photo  camera  proof  signature  security 
march 2017
E-Ink Tablets | Digital Paper & Notepads | Sony US
In a world overwhelmed with paper, Sony introduces a revolutionary way to work. Digital Paper from Sony, in conjunction with a cloud service, gives you the power to annotate, share, and save your documents – all from a handy device that's light enough to carry anywhere.
notetaking  notes  hardware  devices 
february 2017
reMarkable | The paper tablet
The paper tablet for people who prefer paper. Here to replace your notebooks, sketchbooks and printouts. Paper-like reading, writing and sketching with digital powers.
notetaking  notes  devices  hardware 
february 2017
“These 25 Productivity Principles Will Change How You Work Forever”
Everyone struggles to get work done everyday. Here is a summary of all you need to know and do to get real work done everyday without losing your mind.
Productivity 
february 2017
My Google Keep 2017 Wishlist
I then decided to... (insert drum roll sound effect) ...stick with Google. Meaning, using Google Keep for all kinds of lists and notes, and Google Drive for longer drafts.
productivity  Google  note  notetaking 
february 2017
Material Design Color Palette Generator - Material Palette
Making over your site’s typography isn’t just about finding the right font or size. Nope, it’s also about finding the right color. If you haven’t experimented with this Material Design Palette yet, take a moment to do so now. You’ll see that regardless of which branding colors you select, the primary and secondary font color are always black or a shade of grey.
color  palette  icons  material_design  webdesign  webdev 
february 2017
TCnext - Site dedicated to the development of the next "truecrypt"
TrueCrypt.ch is the gathering place for all up-to-date information. Unfortunately TrueCrypt.org is dead. But, we (the pure-privacy people) will help organize a future.
TrueCrypt  security  cryptography 
february 2017
VeraCrypt - Home
VeraCrypt is a free disk encryption software brought to you by IDRIX and that is based on TrueCrypt 7.1a.
TrueCrypt  security  cryptography  VeraCrypt 
february 2017
TrueCrypt 7.1a Hashes
The SHA256, SHA1, and MD5 hashes of all TrueCrypt version 7.1a files.
TrueCrypt  security  cryptography 
february 2017
How to Create a Wiki Knowledge Base Using WordPress
Are you looking to add a support / documentation section to your site? Want to know the best way to add a wiki knowledge base to your WordPress site? In this article, we will show you how to create a wiki knowledge base in WordPress.
knowledge_base  WordPress  wiki 
january 2017
Perché ho detto ai miei amici di non usare più WhatsApp e Telegram
Un confronto sulle impostazioni di privacy delle app di messaggistica.
security  messaging  WhatsApp  Telegram  Allo  Messenger  Signal 
january 2017
Guardian Project – People, Apps and Code You Can Trust
Guardian Project creates easy to use secure apps, open-source software libraries, and customized mobile devices that can be used around the world by any person looking to protect their communications and personal data from unjust intrusion, interception and monitoring.
privacy  security 
january 2017
Tactical Technology Collective
Tactical Tech is a non profit that explores the political and social role of technology in our lives.
activism  privacy 
january 2017
Home | Me and my Shadow
Through your computer, mobile phone, and other digital devices, you leave behind hundreds of digital traces (also called data traces) every day: bits of information about you that are created, stored, and collected.  When your digital traces are put together to create stories about you or profiles of you, these become your digital shadows. These can give others huge insight into your life; and they can also be totally wrong. Either way, once they're out there, they are almost impossible to control....
privacy  security 
january 2017
security in-a-box | tools and tactics for digital security
Security in-a-Box is a guide to digital security for activists and human rights defenders throughout the world.
security  privacy  activism  human_rights  journalism  GnuPG  gpg 
january 2017
Welcome to the United States of Emergency
Today marks the first day of a disaster on a scale that until a few months ago was beyond our imagination.
politics  from instapaper
january 2017
Create a Print-Friendly Page with Gutenberg.css - Hongkiat
On informational websites it’s still a good practice to offer a custom print stylesheet. Thankfully, you don’t need to design your own because Gutenberg is here to help.
CSS  webdev  print 
january 2017
“Why I told my friends to stop using WhatsApp and Telegram”
Reading the above, you might think you are fine since WhatsApp, Facebook Messenger, and Google Allo also use the Signal Protocol. Well, you’re not.
security  messaging  WhatsApp  Telegram  Allo  Messenger  Signal 
january 2017
« earlier      
@font-face admin aldolat.it android apache apple apps archive art astronomy audio authentication backup bazaar best blackberry blog blogging books browser bug buttons cache calendar canonical cheatsheet chess chiesa cloud cms code color colore comments content converter copyright crittografia cryptography css css3 cultura custom custom-fields custom-post-type database design desktop development dictionary dns documentation dropbox dropdown ebook ecommerce education email encryption english enti evolution fcm federazioni feed feedburner files filesharing filesystem firefox flash fonts forensics forum fotografia framework free free_music freelance freeware functions gallery generator git gmail gnome gnu/ubuntu gnupg google gpg grafica grafica_dtp graphics grid grub gtd guide hacks hardware help hooks hosting hotlinking howto htaccess html html5 icons ie ie6 image images inkscape inspiration internet iso italiano javascript jobs joomla jquery kde language latex launchpad lavoro layout learning letture libri linguistica linux logos loop mac malware management maps media mediawiki menu meteo mobile modding moving mozilla multimedia music mysql nas nautilus navigation netiquette networking news news_informatica nopost notes oop openfont openoffice opensource optimization options osx86 password patterns pdf performance persone pgp photo photography photoshop php play plugin podcast politica post privacy productivity quotidiani recovery redirect reference repository reset resources responsive router rss samsung scacchi science search security seo server servizi sharing shopping shortcodes skype slider slideshow social software space ssh ssl standards statistics storage streaming subversion svago svn sync sysadmin tema_k2 templates test text textures themes thumbnail time tips tools tracking translation tricks truecrypt tutorials tv twitter type typography ubuntu unread url utilities utility video virtualbox w3c web web2.0 webapp webdesign webdev wiki windows wishlist wordpress wp_query

Copy this bookmark:



description:


tags: