aldolat + encryption   25

Font Steganography
Interesting research in steganography at the font level.
cryptography  encryption  steganography  security 
29 days ago by aldolat
Cryptomator: Free Cloud Encryption for Dropbox & Others
Free client-side encryption for your cloud files. Open source software: No backdoors, no registration.
encryption  privacy  security  cloud 
4 weeks ago by aldolat
Standard Notes | A Simple And Private Notes App
Standard Notes is a safe place for your notes, thoughts, and life's work.
notes  tools  notetaking  encryption  productivity 
4 weeks ago by aldolat
Cryptomator come possibile erede di TrueCrypt
Cryptomator infatti permette di creare container di file inaccessibili senza la giusta chiave, scelta dall’utente e impostata esclusivamente Client Side, senza quindi che avvenga comunicazione alcuna con server della società o terze entità ulteriori.
encryption  privacy  security  cloud 
5 weeks ago by aldolat
Russia is Banning Telegram
If you want secure messaging, use Signal. If you're concerned that having Signal on your phone will itself arouse suspicion, use WhatsApp.
Telegram  security  privacy  encryption 
8 weeks ago by aldolat
Why You Should Stop Using Telegram Right Now 
Telegram has a wide range of security issues and doesn’t live up to its proclamations as a safe and secure messaging application.
security  encryption  privacy  Telegram 
8 weeks ago by aldolat
Free Secure Email Certificate with Digital Signature
Start protecting your digital communications with Comodo secure certificate
S_MIME  cryptography  encryption  signature  free  email  privacy  certificate 
10 weeks ago by aldolat
The Big Debate, 2048 vs. 4096, Yubico’s Position | Yubico
While it is true that a longer key provides better security, we have shown that by doubling the length of the key from 2048 to 4096, the increase in bits of security is only 18, a mere 16%.
GnuPG  gpg  security  encryption  keys 
december 2017 by aldolat
GnuPG Frequently Asked Questions
At the time the decision was made, 2048-bit RSA was thought to provide reasonable security for the next decade or more while still being compatible with the overwhelming majority of the OpenPGP ecosystem.
GnuPG  gpg  security  encryption  keys  faq 
december 2017 by aldolat
operational pgp - draft
This is a guide on how to email securely.
email  encryption  gpg  security  GnuPG 
october 2017 by aldolat
Australia Considering New Law Weakening Encryption - Schneier on Security
Never mind that the law 1) would not achieve the desired results because all the smart "terrorists and drug traffickers and pedophile rings" will simply use a third-party encryption app, and 2) would make everyone else in Australia less secure. But that's all ground I've covered before.
security  encryption  Australia 
july 2017 by aldolat
Wikileaks CIA Files - What this means for Internet security and encryption - ProtonMail Blog
Earlier today, Wikileaks dumped a large database of secret documents from the CIA in a released dubbed #Vault7. Here we do a deeper analysis of the leak and the broader implications on online security and encrypted services.
security  encryption  wikileaks  cia  leaks 
march 2017 by aldolat
PGP and SSH keys on a Yubikey NEO « Eric Severance
With the new year, I decided it was time to make a new PGP key. I wanted to keep this key on a Yubikey NEO and NEO-n for every day use. By using hardware tokens like the Yubikey, the private PGP keys never need to be stored on my computer. The PGP keys on the Yubikey can also be used for SSH public-key authentication.
encryption  pgp  YubiKey  gpg  gnupg  letture 
june 2015 by aldolat
Let's Encrypt
Let’s Encrypt is a new Certificate Authority: It’s free, automated, and open.
ssl  encryption  security  certificate 
may 2015 by aldolat
PI: Disco Cifrato? Recupero password garantito
E' possibile recuperare la password dei sistemi di cifratura più diffusi nel giro di un'ora. Il software non è esattamente economico, l'obiettivo è aiutare l'informatica forense
encryption  security 
february 2012 by aldolat
Diceware in Italiano
Questa è la pagina ufficiale in lingua italiana, tradotta ed adattata da Tarin Gamberini, autorizzata dall'autore originale Arnold G. Reinhold, della The Diceware Passphrase Home Page.
security  password  diceware  encryption  cryptography 
september 2011 by aldolat
SecretSync - Client-side encryption for Dropbox
SecretSync is a great way to easily share proprietary, sensitive information using online synchronization utilities like Dropbox.
storage  encryption  security  dropbox 
may 2011 by aldolat
slight paranoia: How Dropbox sacrifices user privacy for cost savings
I also urge the company to abandon its deduplication system design, and embrace strong encryption with a key only known to each user. Other online backup services have done it for some time. This is the only real way that data can be secure in the cloud.
dropbox  security  encryption 
april 2011 by aldolat
Tarsnap - Online backups for the truly paranoid
Tarsnap is a secure online backup service for BSD, Linux, OS X, Solaris, Cygwin, and can probably be compiled on many other UNIX-like operating systems. The Tarsnap client code provides a flexible and powerful command-line interface which can be used directly or via shell scripts.
backup  encryption  security 
april 2011 by aldolat
How to Use Gnu Privacy Guard - Community Ubuntu Documentation
GnuPG uses public-key cryptography so that users may communicate securely. In a public-key system, each user has a pair of keys consisting of a private key and a public key. A user's private key is kept secret; it need never be revealed. The public key may be given to anyone with whom the user wants to communicate.
gpg  gnupg  pgp  security  encryption  howto 
october 2010 by aldolat
Create an Encrypted Private Directory with eCryptfs | Tombuntu
eCryptfs is a kernel-native cryptographic filesystem. It’s also a stacked filesystem, eCryptfs must work on top of another filesystem such as Ext3. This means that you don’t need to allocate space for eCryptfs, it will grow and shrink as you add files to it.
linux  security  privacy  filesystem  howto  encryption 
september 2008 by aldolat

Copy this bookmark:



description:


tags: