December 19, 2012
Andreas Happe wrote a simple guide on how to encrypt your home directory or USB sticks with Linux. Some time ago I blogged about Encrypted Linux on USB key, which uses the same encrypting solution, LUKS. The guide: Linux: How to encrypt your data on hard drives, USB sticks, etc. – Random sputterings...
October 3, 2012
There’s a new standard hash algorithm in town, its official title is SHA-3 but its birth name is Keccak. NIST announced yesterday the winner of a long contest, that selected from many submissions the 5 algorithms most apt to substitute the current SHA-2 hash method, and from those 5 Keccak emerged as a victor. As I wrote in […]
September 19, 2012
WhatsApp is broken, really broken | fileperms. This article explains in details many security problems of WhatsApp, the widely used instant messaging application. To summarize: The mobile number is sent in plain text over the network The username of the account is the mobile number The password can be derived either from the MAC address […]
September 15, 2012
A collection of very thoughtful measures to protect your data when you take your laptop around. It doesn’t cover international-spy-level security, but everything suggested can be put into place by any computer geek that is worried of data and identity theft, in order to achieve a reasonable protection. afreak.ca » Safeguarding your laptop with encryption, […]
April 22, 2012
Choosing a password is always a trade-off between security and usability. Programmers can shift this compromise thanks to some qualities of their work. The idea is to use lines of code as passwords.
January 3, 2012
In this post I suggest a way to have an encrypted Linux installation on a USB key, which to me is useful when I travel and I want to securely access the functionality that desktop Linux offers. I want to have no fear that what I take with me will be stolen, even if what I take with me is a full Linux OS, together with my data and maybe some online passwords saved in the browser.
October 16, 2011
Google has recently implemented two-factor authentication for user accounts. After reading its description and watching the explanatory video (here is the guide) I activated this option as soon as I could. It really is as user-friendly as it gets, for the security it gives. Since I own an Android phone I also activated the ability […]