Category: #security
-
Keybase.io
New service promising security, keys verification etc. etc.Find me at https://keybase.io/dosch Keybase will be a public directory of publicly auditable public keys. All paired, for convenience, with unique usernames. …and a pretty sweet reference client. Via https://keybase.io/ #keybaseio #lookingforsolutions #security #software
-
Downloading Software Safely Is Nearly Impossible
Downloading Software Safely Is Nearly ImpossiblePosted on March 3, 2014 by snackypantsLet’s say you have a brand-new Windows laptop and you’re just oh, so happy. You’re pretty sure the NSA did not interdict it during shipment, and thus that it comes only with the flaky goatware Microsoft, Lenovo, and any number of Lenovo’s business partners intended […]
-
In de Groene
In de kersteditie van de Groene Amsterdammer stond een artikel over digitale veiligheid. Met onder andere yours truly Download hier! (PDF) #groeneamsterdammer #interview #security
-
It’s that time of the year
#calvin #image #nsa #security
-
NSA/Snowden Timeline
This is a little timeline I made based on the information from Al Jazeera. June 5, 2013Guardian announces leak of classified NSA documents June 6, 2013PRISM exposed to American public June 7, 2013American cyber-attack list uncovered
-
Links to remember on PRISM and Snowden
Hi, What we’re seeing in Der Spiegel, The Guardian, Washington Post andother select publications is the birth of new threat models – not justfor activists but for all of civil society, parliamentarians, companiesand more. This is a threat model that “many have known” and yet at thesame time, there is clearly new stuff. For one […]
-
Moxie gets mail (from Saudi-Arabia)
we are working in defining a way to deal with all such requirements from regulator and it is not only for Whatsapp, it is for whatsapp, line, viber, twitter etc.. So, what we need your support in is the following: is there any technical way that allow for interception these traffic? Is there any company […]
-
The mud puddle test
The mud puddle testYou don’t have to dig through Apple’s ToS to determine how they store their encryption keys. There’s a much simpler approach that I call the ‘mud puddle test’: First, drop your devices in a mud puddle. Next, slip in said puddle and crack yourself on the head. When you regain consciousness you’ll […]
-
What’s wrong with the kids these days? | PUSCII blog
A lot has changed since the days when the people around Hacktic set up and defined the Dutch hacker scene. The Hang Out made way for a variety of hackerspaces; Hacktic itself is long dead (who needs dead trees to communicate nowadays anyway?) and the crew organizing OHM2013 is a completely different one from the […]
-
Veilig mailen
Ik wil graag vaker veilig mailen met jullie allemaal. Hiervoor gebruik ik GPG.Lees hier hoe dat werkt: http://tinyurl.com/openpgp-manual Mijn gpg-key kan je hier vinden:Tekst – Bestandje En je kan hier klikken als je m’n handtekening wil verifiëren Post hieronder je GPG-key als je er eentje gemaakt hebt!En denk eraan: als je een key maakt voor […]