Browsing All posts tagged under »encryption«

A story of Gmail war on spam, and plans for end-to-end encrypted mail

September 6, 2014


Mike Hearn is a security expert that worked on prevention of spam and abuse at Google, and on Bitcoin-related systems. He wrote a rich but clear mail that gives a good perspective on the effort that email providers must pay to be able to fight spam effectively: Modern anti-spam and E2E crypto (via The essay […]

Bruce Schneier on government surveillance

September 8, 2013


The security expert Bruce Schneier wrote some useful essays on the current situation of Edward Snowden exposing the US surveillance programs, especially the documents where the US and UK intelligence agencies allegedly cracked the protection measures of common users for data collection and analysis. In “Conspiracy Theories and the NSA“, he argues that the feeling […]

Linux: How to encrypt your data on hard drives, USB sticks, etc. – Random sputterings..

December 19, 2012


Andreas Happe wrote a simple guide on how to encrypt your home directory or USB sticks with Linux. Some time ago I blogged about Encrypted Linux on USB key, which uses the same encrypting solution, LUKS. The guide: Linux: How to encrypt your data on hard drives, USB sticks, etc. – Random sputterings...

The winner of SHA-3 contest

October 3, 2012


There’s a new standard hash algorithm in town, its official title is SHA-3 but its birth name is Keccak. NIST announced yesterday the winner of a long contest, that selected from many submissions the 5 algorithms most apt to substitute the current SHA-2 hash method, and from those 5 Keccak emerged as a victor. As I wrote in […] » Safeguarding your laptop with encryption, passwords, and behaviour

September 15, 2012


A collection of very thoughtful measures to protect your data when you take your laptop around. It doesn’t cover international-spy-level security, but everything suggested can be put into place by any computer geek that is worried of data and identity theft, in order to achieve a reasonable protection. » Safeguarding your laptop with encryption, […]

How programmers can easily choose strong passwords

April 22, 2012


Choosing a password is always a trade-off between security and usability. Programmers can shift this compromise thanks to some qualities of their work. The idea is to use lines of code as passwords.

Encrypted Linux on USB key

January 3, 2012


In this post I suggest a way to have an encrypted Linux installation on a USB key, which to me is useful when I travel and I want to securely access the functionality that desktop Linux offers. I want to have no fear that what I take with me will be stolen, even if what I take with me is a full Linux OS, together with my data and maybe some online passwords saved in the browser.