Browsing All Posts filed under »Security«

20 security tips for Data Privacy Day 2016

January 28, 2016

0

The 28th of January has been declared the Data Privacy Day, a moment where we spread awareness on how personal information is managed, both by us and by the entities that have access to it. For the occasion, I put together a list of tips and food for thought; feel free to share it and […]

Sticky Bits » Security and Connected Devices

September 14, 2015

0

A clickbait headline for this article would be something like: “The 10 secrets to save your next IoT product from cyber attacks” The author makes valid points, enumerates powerful real-life examples when things actually went wrong, and shows the mindset to apply when thinking about security in general. With the Internet of Things, we are seeing more and more […]

A story of Gmail war on spam, and plans for end-to-end encrypted mail

September 6, 2014

2

Mike Hearn is a security expert that worked on prevention of spam and abuse at Google, and on Bitcoin-related systems. He wrote a rich but clear mail that gives a good perspective on the effort that email providers must pay to be able to fight spam effectively: Modern anti-spam and E2E crypto (via reddit.com/r/programming). The essay […]

Schneier on Security: Security Risks of Embedded Systems

January 9, 2014

0

Security expert Bruce Schneier wrote an essay on the present dangers of routers and small devices connected to the Internet: Schneier on Security: Security Risks of Embedded Systems. It’s supposed to be a wake-up call for the companies selling integrated chips and embedded systems: they need to design their product better, increasing inherent security, ensuring […]

TED talk on everyday cybercrime

September 17, 2013

0

The following talk by James Lyne is an interesting wake-up call. It’s a video that technology enthusiasts could share with anyone even if they’re not familiar with computer science. James executes, in real time, two practical examples of hacking, and also shows what data and statistics can be collected by scanning a room full of […]

Bruce Schneier on government surveillance

September 8, 2013

0

The security expert Bruce Schneier wrote some useful essays on the current situation of Edward Snowden exposing the US surveillance programs, especially the documents where the US and UK intelligence agencies allegedly cracked the protection measures of common users for data collection and analysis. In “Conspiracy Theories and the NSA“, he argues that the feeling […]

Linux: How to encrypt your data on hard drives, USB sticks, etc. – Random sputterings..

December 19, 2012

2

Andreas Happe wrote a simple guide on how to encrypt your home directory or USB sticks with Linux. Some time ago I blogged about Encrypted Linux on USB key, which uses the same encrypting solution, LUKS. The guide: Linux: How to encrypt your data on hard drives, USB sticks, etc. – Random sputterings...

The winner of SHA-3 contest

October 3, 2012

0

There’s a new standard hash algorithm in town, its official title is SHA-3 but its birth name is Keccak. NIST announced yesterday the winner of a long contest, that selected from many submissions the 5 algorithms most apt to substitute the current SHA-2 hash method, and from those 5 Keccak emerged as a victor. As I wrote in […]

WhatsApp is broken, really broken | fileperms

September 19, 2012

0

WhatsApp is broken, really broken | fileperms. This article explains in details many security problems of WhatsApp, the widely used instant messaging application. To summarize: The mobile number is sent in plain text over the network The username of the account is the mobile number The password can be derived either from the MAC address […]

afreak.ca » Safeguarding your laptop with encryption, passwords, and behaviour

September 15, 2012

0

A collection of very thoughtful measures to protect your data when you take your laptop around. It doesn’t cover international-spy-level security, but everything suggested can be put into place by any computer geek that is worried of data and identity theft, in order to achieve a reasonable protection. afreak.ca » Safeguarding your laptop with encryption, […]