Category: #security
-
How to disable ssh password login on Linux to increase security
This is a great article that deserves a link here. https://www.cyberciti.biz/faq/how-to-disable-ssh-password-login-on-linux/
-
Own Mailbox
This seems like a very nice little project. Curious to learn how they build it and the exact specs of hardware used. And more importantly… will it blend? More here at the own-mailbox website #diy #foundprivacy #quote #security #software
-
Canary
—–BEGIN PGP SIGNED MESSAGE—–Hash: SHA256 Status: All goodPeriod: January 1 to June 30, 2015 During this period, dosch.it has received: Zero National Security LettersZero Foreign Intelligence Surveillance Court ordersZero gag orders that prevent us from from stating that we have received legal process seeking our customers’ information doschGeneral Counseldosch.it—–BEGIN PGP SIGNATURE—– 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zoND—–END PGP SIGNATURE—– Made […]
-
Sticker with an Elephant
I made a sticker today for Free Press Unlimited and Greenhost to be used during GCCS2015 and hopefully long after. Click the picture to download a PDF so you can print your own! #diy #image #mytext #security #sticker #theelephantintheroom
-
Spyware 2.0
From here: https://aralbalkan.com/notes/spyware-2.0/ Spyware 2.0 is not cloak and dagger. It’s not hiding in the shadows; it’s hiding out in plain sight like some saccharine Ronald McDonald statue. Spyware 2.0 is all cute doodles and loveable dinosaurs. It’s all the colours of the rainbow. Spyware 2.0 is so damn adorable that you just want to […]
-
6 easy rules to identify 99% of snakeoil
via Security and the Rise of Snakeoil not free software runs in a browser runs on a smartphone, the user doesn’t generate, or exclusively own the private encryption keys, there is no threat model, uses terminology like “cyber”, “military-grade”, or other marketing mantra, #lookingforsolutions #quote #security #snakeoil #software #stef
-
Tor executive director hints at Firefox integration
The Tor anonymity network may soon expand to hundreds of millions of new users around the world as the software’s developers prepare to scale to a “global population.” Several major tech firms are in talks with Tor to include the software in products that can potentially reach over 500 million Internet users around the world. […]
-
Apple protecting its customers
Word has it todaythat anyone going to the Tor website is tracked by the NSA after that. So if you clicked that link, you’re now a high value target for the NSA. Just by coincidence I past the Apple store in Amsterdam today to ask for a new battery for my laptop. Out of curiosity […]
-
Why King George III Can Encrypt
King George III set aside his quill, having completed secret orders to put down the rebellion. It was imperative that they remain secure, visible only to Generals Gage and Howe. The King opened a cabinet in the wall behind him, revealing hundreds of locks each labelled with the name of a British General. Selecting one […]
-
Everything Is Broken
Security and privacy experts harangue the public about metadata and networked sharing, but keeping track of these things is about as natural as doing blood panels on yourself every morning, and about as easy. The risks on a societal level from giving up our privacy are terrible. Yet the consequences of not doing so on […]