aldolat + cryptography   42

Fluidkeys
Protect your team with strong encryption. Fluidkeys builds on OpenPGP and makes it easy to implement great security across your organisation.
encryption  security  GnuPG  OpenPGP  cryptography 
3 days ago by aldolat
Font Steganography
Interesting research in steganography at the font level.
cryptography  encryption  steganography  security 
may 2018 by aldolat
Free Secure Email Certificate with Digital Signature
Start protecting your digital communications with Comodo secure certificate
S_MIME  cryptography  encryption  signature  free  email  privacy  certificate 
april 2018 by aldolat
Certificates for secure electronic mail | Actalis S.p.A.
Make your email secure by sending signed and/or encrypted messages.
S_MIME  cryptography  encryption  signature  free  email  privacy  certificate 
april 2018 by aldolat
Protecting Code Integrity with PGP — Part 4: Moving Your Master Key to Offline Storage
Here in part 4, we continue the series with a look at how and why to move your master key from your home directory to offline storage.
GnuPG  gpg  security  cryptography  keys 
march 2018 by aldolat
CryptoParty
CryptoParty is a decentralized movement with events happening all over the world. The goal is to pass on knowledge about protecting yourself in the digital space. This can include encrypted communication, preventing being tracked while browsing the web, and general security advice regarding computers and smartphones.
security  privacy  GnuPG  gpg  PGP  cryptography 
november 2017 by aldolat
OpenPGP Best Practices - riseup.net
We have gathered here a lot of information about configuring GnuPG. There are detailed explanations for each configuration suggestion. Many of these changes require you to make changes to the GnuPG configuration file on your machine located at ~/.gnupg/gpg.conf. For your convenience, all the suggested changes to the gpg.conf file are gathered in one place near the bottom of this page. We strongly encourage you to not blindly copy the file, but read the document and understand what the settings do.

Also note that this guide was written for legacy versions of GnuPG (1.4) and may contain recommendations that are redundant with default settings in newer releases of GnuPG (2.1 and above). A review is in progress to make sure the guide is up to date. You can help by submitting changes yourself.
gpg  GnuPG  security  privacy  cryptography 
october 2017 by aldolat
Secure Salted Password Hashing - How to do it Properly
If you're a web developer, you've probably had to make a user account system. The most important aspect of a user account system is how user passwords are protected. User account databases are hacked frequently, so you absolutely must do something to protect your users' passwords if your website is ever breached. The best way to protect passwords is to employ salted password hashing. This page will explain why it's done the way it is.
password  hashing  cryptography  security 
july 2017 by aldolat
TCnext - Site dedicated to the development of the next "truecrypt"
TrueCrypt.ch is the gathering place for all up-to-date information. Unfortunately TrueCrypt.org is dead. But, we (the pure-privacy people) will help organize a future.
TrueCrypt  security  cryptography 
february 2017 by aldolat
VeraCrypt - Home
VeraCrypt is a free disk encryption software brought to you by IDRIX and that is based on TrueCrypt 7.1a.
TrueCrypt  security  cryptography  VeraCrypt 
february 2017 by aldolat
TrueCrypt 7.1a Hashes
The SHA256, SHA1, and MD5 hashes of all TrueCrypt version 7.1a files.
TrueCrypt  security  cryptography 
february 2017 by aldolat
Crittografia con Vigenère
Crittografia con Cifrario di Vigenère
vigenere  cryptography 
august 2014 by aldolat
Crittanalisi semi-automatica del Vigenere
Questa pagina consente la crittanalisi [semi]automatica di un testo cifrato secondo Vigenere con il metodo del χ quadrato.
crittoanalisi  vigenere  cryptography 
august 2014 by aldolat
Diceware in Italiano
Questa è la pagina ufficiale in lingua italiana, tradotta ed adattata da Tarin Gamberini, autorizzata dall'autore originale Arnold G. Reinhold, della The Diceware Passphrase Home Page.
security  password  diceware  encryption  cryptography 
september 2011 by aldolat
Spy Stations and Cryptography
Despite the lack of concrete details about these mysterious numbers stations, over the years it has been assumed that the numbers are really messages encrypted using a one-time pad.
cryptography  one-time-pad 
may 2011 by aldolat
CAcert.org
CAcert.org is a community-driven certificate authority that issues free public key certificates to the public (unlike other certificate authorities which are commercial and sell certificates). CAcert has nearly 150,000 verified users and has issued over 548,000 certificates as of January 2010.
security  ssl  cryptography  signature  certificate 
december 2010 by aldolat
La vita in gioco « Alessandro Bottoni
Quello che trovate qui di seguito è un piccolo manuale di sicurezza informatica (ma non solo informatica) ad uso di magistrati, avvocati, giornalisti ed altre persone che per una ragione o per l’altra si trovano a dover trattare dati veramente sensibili (informazioni sulle malefatte di questo o quel politico, di questo o quel mafioso e cose simili). In questi casi, come abbiamo ben visto, la posta in gioco può essere la carriera, o persino la vita, e quindi è necessario un livello di sicurezza ben diverso da quello che si deve garantire in un normale ufficio. Ciò che state per leggere, quindi, è un vero concentrato di paranoia. Non servirà mai al 99,999% dei lettori di questo blog. Per il restante 0,001%, tuttavia, potrebbe rappresentare la differenza tra la vita e la morte.
security  journalism  cryptography 
december 2010 by aldolat
Introduzione alla crittografia | FABblog
I migliori articoli di Fabrizio Sinopoli scritti per oneITsecurity
security  cryptography 
september 2008 by aldolat

Copy this bookmark:



description:


tags: