aldolat + encryption   14

Australia Considering New Law Weakening Encryption - Schneier on Security
Never mind that the law 1) would not achieve the desired results because all the smart "terrorists and drug traffickers and pedophile rings" will simply use a third-party encryption app, and 2) would make everyone else in Australia less secure. But that's all ground I've covered before.
security  encryption  Australia 
9 weeks ago by aldolat
Wikileaks CIA Files - What this means for Internet security and encryption - ProtonMail Blog
Earlier today, Wikileaks dumped a large database of secret documents from the CIA in a released dubbed #Vault7. Here we do a deeper analysis of the leak and the broader implications on online security and encrypted services.
security  encryption  wikileaks  cia  leaks 
march 2017 by aldolat
PGP and SSH keys on a Yubikey NEO « Eric Severance
With the new year, I decided it was time to make a new PGP key. I wanted to keep this key on a Yubikey NEO and NEO-n for every day use. By using hardware tokens like the Yubikey, the private PGP keys never need to be stored on my computer. The PGP keys on the Yubikey can also be used for SSH public-key authentication.
encryption  pgp  yubikey  gpg  gnupg  letture 
june 2015 by aldolat
Let's Encrypt
Let’s Encrypt is a new Certificate Authority: It’s free, automated, and open.
ssl  certificates  encryption  security 
may 2015 by aldolat
PI: Disco Cifrato? Recupero password garantito
E' possibile recuperare la password dei sistemi di cifratura più diffusi nel giro di un'ora. Il software non è esattamente economico, l'obiettivo è aiutare l'informatica forense
encryption  security 
february 2012 by aldolat
Diceware in Italiano
Questa è la pagina ufficiale in lingua italiana, tradotta ed adattata da Tarin Gamberini, autorizzata dall'autore originale Arnold G. Reinhold, della The Diceware Passphrase Home Page.
crittografia  security  password  diceware  encryption 
september 2011 by aldolat
SecretSync - Client-side encryption for Dropbox
SecretSync is a great way to easily share proprietary, sensitive information using online synchronization utilities like Dropbox.
storage  encryption  security  dropbox 
may 2011 by aldolat
slight paranoia: How Dropbox sacrifices user privacy for cost savings
I also urge the company to abandon its deduplication system design, and embrace strong encryption with a key only known to each user. Other online backup services have done it for some time. This is the only real way that data can be secure in the cloud.
dropbox  security  encryption 
april 2011 by aldolat
Tarsnap - Online backups for the truly paranoid
Tarsnap is a secure online backup service for BSD, Linux, OS X, Solaris, Cygwin, and can probably be compiled on many other UNIX-like operating systems. The Tarsnap client code provides a flexible and powerful command-line interface which can be used directly or via shell scripts.
backup  encryption  security 
april 2011 by aldolat
How to Use Gnu Privacy Guard - Community Ubuntu Documentation
GnuPG uses public-key cryptography so that users may communicate securely. In a public-key system, each user has a pair of keys consisting of a private key and a public key. A user's private key is kept secret; it need never be revealed. The public key may be given to anyone with whom the user wants to communicate.
gpg  gnupg  pgp  security  encryption  howto 
october 2010 by aldolat
Create an Encrypted Private Directory with eCryptfs | Tombuntu
eCryptfs is a kernel-native cryptographic filesystem. It’s also a stacked filesystem, eCryptfs must work on top of another filesystem such as Ext3. This means that you don’t need to allocate space for eCryptfs, it will grow and shrink as you add files to it.
linux  security  privacy  filesystem  howto  encryption 
september 2008 by aldolat

Copy this bookmark:



description:


tags: