Jun 302017
 

When law enforcement argues it needs a “backdoor” into encryption services, the counterargument has typically been that it would be impossible to limit such access to one person or organization. If you leave a key under the doormat, a seminal 2015 paper argues, a burglar eventually finds it.

click here for the full article

Apr 282017
 

Imagine you’re about to get on a flight to New Orleans to see your sweetie. You’re in line dreaming of jazz, beignets and jambalaya when you’re pulled aside by a U.S. Customs and Border Protection agent.

click here for the full article

Onion Pi

 Posted by on 2016-11-25 at 18:37  encryption, privacy, Reblog, security, tech, tor  Comments Off on Onion Pi
Nov 252016
 

Feel like someone is snooping on you? Browse anonymously anywhere you go with the Onion Pi Tor proxy. This is fun weekend project that uses a Raspberry Pi, a USB WiFi adapter and Ethernet cable to create a small, low-power and portable privacy Pi. Using it is easy-as-pie.

click here for the full article

Encrypted email service ProtonMail says new users up 100% since Trump victory

 Posted by on 2016-11-11 at 18:14  encryption, government spying, infosec, Politics, Reblog, security, tech, trump  Comments Off on Encrypted email service ProtonMail says new users up 100% since Trump victory
Nov 112016
 

The US election has divided America in two. You’re either cock-a-hoop that Donald Trump has won the keys for the White House, or you’re mortified. There doesn’t seem to be much of a middle ground.

click here for the full article

Google’s AI creates its own inhuman encryption

 Posted by on 2016-10-28 at 17:12  ai, artificial intelligence, encryption, infosec, machine learning, Reblog, security, skynet, tech  Comments Off on Google’s AI creates its own inhuman encryption
Oct 282016
 

What happens when you tell two smart computers to talk to each other in secret and task another AI with breaking that conversation? You get one of the coolest experiments in cryptography I’ve seen in a while.

click here for the full article

Audit sees VeraCrypt kill critical password recovery, cipher flaws

 Posted by on 2016-10-18 at 12:48  encryption, infosec, privacy, Reblog, security  Comments Off on Audit sees VeraCrypt kill critical password recovery, cipher flaws
Oct 182016
 

Security researchers have found eight critical, three medium, and 15 low -severity vulnerabilities in a one month audit of popular encryption platform VeraCrypt.

click here for the full article

Pardon Edward Snowden

 Posted by on 2016-09-15 at 09:35  cryptography, cyber security, edward snowden, encryption, government, infosec, News, nsa, privacy, Reblog, security, snowden, spying  Comments Off on Pardon Edward Snowden
Sep 152016
 

Edward J. Snowden, the American who has probably left the biggest mark on public policy debates during the Obama years, is today an outlaw. Mr.

click here for the full article