orlin + security   181

ZenGo - Bitcoin & Cryptocurrency Wallet
ZenGo is the first keyless bitcoin and cryptocurrency wallet — the most simple and secure way to manage your crypto assets.
mt  crypto  wallet  ux  cryptography  research  distributed  systems  security  ios  mobile  app 
7 weeks ago by orlin
Homepage | Bluzelle - a smart, in-memory data store
Bluzelle is a smart, in-memory data store. It can be used as a cache or as a database. Bluzelle natively supports data types such as hashes, strings, sets, sorted sets, and lists.
mt  decentralized  data  storage  database  cache  performance  security  crypto  technology  redis  compare 
10 weeks ago by orlin
Fifteen Men on a Dead Man’s Switch – Jameson Lopp – Medium
How do you secure your crypto assets from theft while simultaneously protecting them from loss if you die? This is a conundrum that has confounded many crypto asset owners and has even inspired…
bitcoin  cryptocurrency  security  inheritance  keys  storage  management  advice 
january 2019 by orlin
dchapkine/extract-google-authenticator-credentials: Easily move your android GoogleAuthenticator credentials to any new device ( iOS/Android/WP/UbuntuTouch/FFOS ). This reads your google authenticator database and generates original QRcodes
Easily move your android GoogleAuthenticator credentials to any new device ( iOS/Android/WP/UbuntuTouch/FFOS ). This reads your google authenticator database and generates original QRcodes - dchapkine/extract-google-authenticator-credentials
google  authenticator  android  otp  2fa  app  backup  migrate  mobile  phone  root  database  security  hacking  tool  scripts  adb 
november 2018 by orlin
Protectimus Slim NFC - Programmable Hardware OTP Token
Replace your mobile authenticator with secure hardware OTP token! Easily programmed via NFC. Designed to use with Google, Facebook, Dropbox, GitHub, Wordpress, etc.
otp  hardware  auth  token  2fa  card  security  consumer  want  mobile  nfc  android 
november 2018 by orlin
mviereck/x11docker: Run GUI applications and desktops in docker. Focus on security.
Run GUI applications and desktops in docker. Focus on security. - mviereck/x11docker
docker  containers  desktop  gui  xwindows  linux  devops  opensource  tools  cloud  ssh  vnc  security  remote  hacking  tooled 
november 2018 by orlin
GPG Suite
Everything you need to get started with secure communication and encrypting files in one simple package leveraging the power of OpenPGP/GPG
mt  tooled  gpg  macos  encryption  apps  email  privacy  security  pgp  osx  package 
november 2018 by orlin
micahflee/torbrowser-launcher: Securely and easily download, verify, install, and launch Tor Browser in Linux
Securely and easily download, verify, install, and launch Tor Browser in Linux - micahflee/torbrowser-launcher
ubuntu  linux  tor  browser  install  tool  cool  use  security  privacy 
november 2018 by orlin
Home - riseup.net
Riseup provides online communication tools for people and groups working on liberatory social change. We are a project to create democratic alternatives and practice self-determination by controlling our own secure means of communications.
mt  change  activism  community  groups  networking  privacy  security  encryption  services  communication  collaboration  tools 
november 2018 by orlin
Watch Your Hack - a manual to protect you against hackers
Watch Your Hack explains how to protect yourself from hackers, in layman’s terms. Six professional hackers helped create this manual.
security  newbie  intro  bestpractices  privacy  hacking  protect  guide  resource  tutorial 
november 2018 by orlin
Protecting infrastructure secrets with Keywhiz – Square Corner Blog – Medium
At Square, our number one priority is security. We needed something to protect secrets, especially as their number increased with our adoption of a service-orientedmicroservice architecture. Although…
keywhiz  intro  server  tool  secrets  passwords  keys  management  security  operations  devops  filesystem  memory  encryption 
october 2018 by orlin
A file-based secret management and distribution system
mt  served  tooled  secrets  storage  security  cryptography  passwords  keys  configuration  management  deployment  devops  server  keywhiz 
october 2018 by orlin
Open Sourcing Subzero – Square Corner Blog – Medium
Late last year, Square began offering the ability to buy and sell Bitcoin with Cash App. As part of that launch we invested heavily in building out our cryptocurrency infrastructure to help protect…
bitcoin  wallet  cold  storage  security  offline  server  technology  hardware  multisig  opensource  intro  article 
october 2018 by orlin
A Guide to Post-Quantum Cryptography | Trail of Bits Blog
For many high-assurance applications such as TLS traffic, medical databases, and blockchains, forward secrecy is absolutely essential. It is not sufficient to prevent an attacker from immediately decrypting sensitive information. Here the threat model encompasses situations where the adversary may dedicate many years to the decryption of ciphertexts after their collection. One potential way forward…
quantum  cryptography  security  computing  algorithms  mathematics 
october 2018 by orlin
Open Source Password Management Solutions | Bitwarden
Bitwarden is a free and open source password management solution for individuals, teams, and business organizations.
mt  tooled  served  service  cheap  opensource  passwords  management  security  encryption  personal  self  business  use  server  apps  desktop  mobile  browser  extensions 
october 2018 by orlin
How the Galaxy Note 7 iris scanner works
The Samsung Galaxy Note 7 has an iris scanner that keeps the phone safe from prying eyes. How does it work, however? Is it reliable and is it safe? We'll try to answer these questions for you...
smartphone  biometrics  security  samsung  eye  health 
august 2018 by orlin
VeraCrypt - Free Open source disk encryption with strong security for the Paranoid
VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files.
mt  tooled  self  encryption  security  software  truecrypt  linux  mac  osx  windows  multiplatform  use  cryptography  filesystem  data  privacy  travel 
august 2018 by orlin
Metal Bitcoin Seed Storage Stress Test – Jameson Lopp – Medium
Storing wealth with private keys has changed the game when it comes to financial sovereignty. On one hand, they make it easy to store and transport. On the other hand, they make it easy to lose…
bitcoin  security  hardware  private  key  management  seed  wallet  cryptocurrency 
august 2018 by orlin
The SIM Hijackers - Motherboard
Meet the hackers who flip seized Instagram handles and cryptocurrency in a shady, buzzing underground market for stolen accounts and usernames. Their victims' weakness? Phone numbers.
sim  mobile  security  attack  understanding  vulnerability 
august 2018 by orlin
Personal Safety in a p2p Social Network – Enspiral Tales – Medium
Spaces built on p2p reveal promising new ways of interacting digitally. This is a practical exploration of how we protect ourselves from abuse in the Scuttlebutt social network.
p2p  social  security  decentralization  commons  people  safety  scuttlebutt  redecentralize 
june 2018 by orlin
ENCRYPTED SMARTPHONES - Ncryptcellular - Smart. Safe. Secure.
Get encrypted smartphone privacy, free of all Google services, evade metadata collection and achieve secure communications all running a hardened Android OS
security  privacy  hardware  android  phone 
june 2018 by orlin
CopperheadOS - Secure mobile devices
A security and privacy focused mobile operating system compatible with Android apps
privacy  security  android  os  firmware  rom  use 
june 2018 by orlin
Qubes OS: A reasonably secure operating system
Qubes is a security-oriented, free and open-source operating system for personal computers that allows you to securely compartmentalize your digital life.
mt  linux  os  distro  security  privacy  xen  virtualization  opensource  use 
may 2018 by orlin
Secure ledgers don't require proof-of-work
Software, decentralization, peer-to-peer systems, and more.
blockchain  dat  beaker  browser  pow  ledger  security  compare  blogpost 
may 2018 by orlin
Trail of Bits
Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. We combine high-­end security research with a real­...
security  software  audit  consulting  company  crypto 
may 2018 by orlin
Observatory by Mozilla
Observatory by Mozilla is a project designed to help developers, system administrators, and security professionals configure their sites safely and securely.
security  website  ssl  https  testing  tool  mozilla  webdev 
may 2018 by orlin
Quantum Computers Pose Imminent Threat to Bitcoin Security - MIT Technology Review
The massive calculating power of quantum computers will be able to break Bitcoin security within 10 years, say security experts.
bitcoin  security  quantum  computing  cryptography  finance  fintech 
april 2018 by orlin
TREZOR Bitcoin Wallet (Official) | The most secure hardware wallet.
TREZOR is more than just a bulletproof bitcoin wallet. TREZOR is also a security device for passwords, accounts and emails.
crypto  password  manager  security  self  use 
april 2018 by orlin
7 Pro Tips for Keeping Your Crypto Safe – ConsenSys Media
How to protect your digital assets from fire, flood, phishing, forgetfulness, and other forces of nature. There’s a “cold room” in Attinghausen, Switzerland — it’s lined with slabs of steel, and it…
cryptocurrency  security  tips 
march 2018 by orlin
How Meltdown and Spectre Were Independently Discovered By Four Research Teams At Once | WIRED
The uncanny coincidences among the Meltdown and Spectre discoveries raise questions about "bug collisions"—and the safety of the NSA's hidden vulnerability collection.
cpu  security  meltdown  spectre  hardware  bug  intel 
january 2018 by orlin
New Method of Producing Random Numbers Could Improve Cybersecurity | UT News | The University of Texas at Austin
A new method for producing truly random numbers could be used to encrypt data, make electronic voting more secure and more accurately simulate complex systems such as Earth's climate.
random  number  mathematics  cryptography  security  crypto 
september 2017 by orlin
End-to-End Encrypted Cloud Storage for Businesses | Tresorit
Encrypted cloud storage for your confidential files. Using Tresorit, files are encrypted before being uploaded to the cloud. Start encrypting files for free.
cloud  security  storage  encryption  backup  sync  privacy  usability  service 
september 2017 by orlin
On the Scalability and Security of Bitcoin Distributed Computing Series: Amazon.de: Prof Roger Wattenhofer, Christian Decker: Fremdsprachige Bücher
Prof Roger - On the Scalability and Security of Bitcoin (Distributed Computing Series) jetzt kaufen. ISBN: 9781530769452, Fremdsprachige Bücher - Computer & Internet
blockchain  technology  book  scalability  security  bitcoin 
september 2017 by orlin
The easiest way to start receiving bitcoins. Claim your Bitcoin username and show friends your profile on the whitepages directory for Bitcoin.
name  identity  security  blockchain  bitcoin  id  social  presence 
november 2016 by orlin

I tried to send an email to info@truecrypt.ch and returns DNS error,how can I contact you?


truecrypt  security  forum  encryption 
november 2016 by orlin
Malwarebytes | Malwarebytes Anti-Malware for Mac
Malwarebytes for Mac uses industry-leading technology to detect and malware and adware from your Mac.
mac  osx  browser  malware  security  privacy  software  clean  ads  os  sysadmin  install  free  app 
april 2016 by orlin
LastPass | Password Manager, Auto Form Filler, Random Password Generator & Secure Digital Wallet App
Password Manager, Auto Form Filler, Random Password Generator & Secure Digital Wallet App
password  saas  tool  security 
april 2016 by orlin
ZeroTier | Software Defined Networking
Every Area Networking
Radically simplify your network with a virtual networking layer that works the same everywhere.

ZeroTier delivers the capabilities of VPNs, SDN, and SD-WAN with a single system. Manage all your connected resources across both local and wide area networks as if the whole world is a single data center.
altnet  opensource  p2p  virtual  lan  network  decentralized  flat  internet  service  vpn  mt  served  tooled  free  cheap  support  security  commercial  software  license  hardware  easy  sysadmin  networkinng  infrastructure  sdn 
april 2016 by orlin
Fixing Flaws in the Original Design of the Internet: Trust-to-Trust Principle — blockstack blog — Medium
We should’ve never trusted the Internet core to begin with, but it’s not too late to correct that mistake.
internet  trust  security  blockchain  dns  alternatives  decentralization  history 
april 2016 by orlin
« earlier      
per page:    204080120160

related tags

2.3  2fa  account  acl  activerecord  activism  adb  admin  ads  advice  agency  ai  air  ajax  algorithms  alternatives  altnet  amd  analysis  android  anonymity  anonymous  apache  api  app  apps  archive  article  attack  attention  audit  auth  authentication  authenticator  authlogic  authorization  aws  backup  beaker  bestpractice  bestpractices  biometrics  bitcoin  blockchain  blogpost  book  browser  bug  business  cache  caja  campaign  capitalism  card  censorship  chai  change  chat  cheap  cheatsheet  cjdns  clean  cli  clojure  cloud  code  cold  collaboration  commercial  commonjs  commons  communication  community  company  compare  computer  computing  configuration  consensus  consulting  consumer  containers  content  controller  convenience  cookie  cool  couchdb  courses  cpu  crack  creativity  credit  crockford  crypto  cryptocurrency  cryptography  css  cyber  cybercrime  cybersecurity  daemon  dat  data  database  debate  decentralization  decentralized  decompiler  define  demo  deployment  desktop  devops  digest  distibuted  distributed  distro  diy  dns  docker  domain  dsl  easy  ebook  education  electrum  email  embedded  encryption  engine  enterprise  estonia  ethereum  europe  exchange  experiment  exploit  express  extensions  eye  fail  features  ffi  file  files  filesystem  filetransfer  filevault  finance  fintech  firewall  firmware  fix  flat  forum  framework  free  freedom  frontend  fun  future  gem  gender  generator  git  giude  golang  google  government  gpg  groups  gui  guide  hack  hacker  hacking  hardware  hash  health  healthcare  heartbeat  heartbleed  history  home  hosted  howto  html5  http  https  humanrights  hyberboria  ico  id  identity  im  incremental  ind.ie  information  infrastructure  inheritance  innovation  insight  inspiration  install  insurance  intel  internet  intro  ios  iot  iphone  ipsec  ipv6  item  jailbreak  javascript  journalism  jquery  key  keys  keyval  keywhiz  know  lan  laptop  learn  learning  ledger  library  license  linux  list  live  location  lock  login  lua  mac  macbook  macos  malware  management  manager  market  mathematics  media  meetup  meltdown  memory  mesh  messaging  metrics  migrate  mobile  monitoring  mozilla  mt  multiplatform  multisig  name  network  networking  networkinng  newbie  nfc  nginx  nodejs  nosql  number  numenta  oauth  offline  online  open  openid  opensource  openssl  operations  opinion  options  os  osx  otp  p2p  package  packets  paper  password  passwords  people  performance  permissionless  persistence  personal  pgp  phishing  phone  php  plugin  posix  pow  prediction  presence  privacy  private  productivity  programming  protect  protocol  quantum  rack  rails  random  rant  reado  redecentralize  redis  reference  registration  regulation  remote  report  reputation  research  resistance  resource  rest  ria  rom  root  ruby  s3  saas  safe  safety  sailfish  samsung  sandbox  scalability  scripts  scuttlebutt  sdn  search  secrets  security  seed  self  selfhosted  served  server  service  services  session  shame  sharing  shorewall  showcases  sim  skype  smart  smartcontracts  smartphone  social  software  spectre  ssh  ssl  standards  storage  store  support  surveillance  sync  sysadmin  systems  talks  technology  ted  templates  test  testing  thunderbird  time  timestamp  tip  tips  token  tool  tooled  tools  tor  tracking  trading  transactions  travel  truecrypt  trust  tunnel  tutorial  twitter  twofactor  u2f  ubuntu  udp  ui  understanding  unix  url  usa  usability  usb  use  user  users  ux  video  views  virtual  virtualization  vnc  vpn  vulnerability  wallet  want  watchit  web  webcam  webdesign  webdev  website  well  whistleblowing  whitelist  widgets  wifi  windows  wireguard  workshop  world  www  xen  xss  xwindows  yubikey  zeroaccess 

Copy this bookmark: