Tag: Encryption

  • Bribe or ‘Tax’? NSA gives 10milion to RSA for Backdoor Access

    Bribe or ‘Tax’? NSA gives 10milion to RSA for Backdoor Access

    Hmm. Hold up. So if we go by this Wikipedia entry.. “Founded as an independent company in 1982, RSA Security, Inc. was acquired by EMC Corporation in 2006 for US$ 2.1 billion and operates as a division within EMC.[5]” People need to understand, this means RSA took around 2% of what they’d make in one…

  • How Online Privacy Tools Are Changing Internet Security

    How Online Privacy Tools Are Changing Internet Security

    How online privacy tools are changing Internet security and driving the (probably quixotic) quest for anonymity in the digital age. For many of us, the Internet is like a puppy—lovable by design and fun to play with, but prone to biting. We suspect that our digital footprint is being tracked and recorded (true), mined and…

  • Whonix: The Anonymous Operating System

    Whonix: The Anonymous Operating System

    Whonix is an anonymous general purpose operating system based on Virtual Box, Ubuntu GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even malware with root rights can find out the user’s real IP/location. Whonix consists of two machines, which are connected through an isolated network. One machine acts as the…

  • How To Secure Your Android Phone Like the NSA

    How To Secure Your Android Phone Like the NSA

    Rejoice, paranoid security fanatics! There’s finally a version of Android that enables your obsessive need to lock and control each and every file on your mobile device. There’s just one catch: you’ve got to trust the National Security Agency to use it. The NSA has released its security-enhanced version of Android, named SE Android… because…

  • Cryptoparty Goes Viral: Pen testers, Privacy Geeks Spread Security to the Masses

    Cryptoparty Goes Viral: Pen testers, Privacy Geeks Spread Security to the Masses

    Security professionals, geeks and hackers around the world are hosting a series of cryptography training sessions for the general public. The ‘crytoparty’ sessions were born in Australia and kicked off last week in Sydney and Canberra along with two in the US and Germany. Information security experts and privacy advocates of all political stripes have…

  • Encryption Becomes Illegal In the UK: Jail Time For Failure To Provide Keys

    Encryption Becomes Illegal In the UK: Jail Time For Failure To Provide Keys

    There was some surprise in the comments of yesterday’s post over the fact that the United Kingdom has effectively outlawed encryption: the UK will send its citizens to jail for up to five years if they cannot produce the key to an encrypted data set. First of all, references – the law is here. You…

  • How to secure your computer and surf fully Anonymous BLACK-HAT STYLE

    How to secure your computer and surf fully Anonymous BLACK-HAT STYLE

    This is a guide with which even a total noob can get high class security for his system and complete anonymity online. But its not only for noobs, it contains a lot of tips most people will find pretty helpfull. It is explained so detailed even the biggest noobs can do it^^ : === The…

  • US Police Can Copy Your iPhone’s Contents In Under Two Minutes

    US Police Can Copy Your iPhone’s Contents In Under Two Minutes

    It has emerged that Michigan State Police have been using a high-tech mobile forensics device that can extract information from over 3,000 models of mobile phone, potentially grabbing all media content from your iPhone in under two minutes. The CelleBrite UFED is a handheld device that Michigan officers have been using since August 2008 to copy information from…

  • An Analysis of Anonymity in the Bitcoin System

    An Analysis of Anonymity in the Bitcoin System

    Bitcoin is not inherently anonymous. It may be possible to conduct transactions is such a way so as to obscure your identity, but, in many cases, users and their transactions can be identified. We have performed an analysis of anonymity in the Bitcoin system and published our results in a preprint on arXiv. The Full Story Anonymity…

  • Verifying Claims of Full-Disk Encryption in Hard Drive Firmware

    Verifying Claims of Full-Disk Encryption in Hard Drive Firmware

    Date: Wed, 9 Nov 2011 10:16:11 +0100 From: Eugen Leitl <eugen[at]leitl.org> To: cypherpunks[at]al-qaeda.net Subject: Re: [p2p-hackers] Verifying Claims of Full-Disk Encryption in Hard Drive Firmware —– Forwarded message from Tom Ritter <tom[at]ritter.vg> —– From: Tom Ritter <tom[at]ritter.vg> Date: Tue, 08 Nov 2011 19:51:53 -0500 To: p2p-hackers[at]lists.zooko.com Subject: Re: [p2p-hackers] Verifying Claims of Full-Disk Encryption in…