Mike Hearn is a security expert that worked on prevention of spam and abuse at Google, and on Bitcoin-related systems. He wrote a rich but clear mail that gives a good perspective on the effort that email providers must pay to be able to fight spam effectively: Modern anti-spam and E2E crypto (via reddit.com/r/programming). The essay […]
September 8, 2013
The security expert Bruce Schneier wrote some useful essays on the current situation of Edward Snowden exposing the US surveillance programs, especially the documents where the US and UK intelligence agencies allegedly cracked the protection measures of common users for data collection and analysis. In “Conspiracy Theories and the NSA“, he argues that the feeling […]
December 19, 2012
Andreas Happe wrote a simple guide on how to encrypt your home directory or USB sticks with Linux. Some time ago I blogged about Encrypted Linux on USB key, which uses the same encrypting solution, LUKS. The guide: Linux: How to encrypt your data on hard drives, USB sticks, etc. – Random sputterings...
October 3, 2012
There’s a new standard hash algorithm in town, its official title is SHA-3 but its birth name is Keccak. NIST announced yesterday the winner of a long contest, that selected from many submissions the 5 algorithms most apt to substitute the current SHA-2 hash method, and from those 5 Keccak emerged as a victor. As I wrote in […]
September 15, 2012
A collection of very thoughtful measures to protect your data when you take your laptop around. It doesn’t cover international-spy-level security, but everything suggested can be put into place by any computer geek that is worried of data and identity theft, in order to achieve a reasonable protection. afreak.ca » Safeguarding your laptop with encryption, […]
April 22, 2012
Choosing a password is always a trade-off between security and usability. Programmers can shift this compromise thanks to some qualities of their work. The idea is to use lines of code as passwords.
January 3, 2012
In this post I suggest a way to have an encrypted Linux installation on a USB key, which to me is useful when I travel and I want to securely access the functionality that desktop Linux offers. I want to have no fear that what I take with me will be stolen, even if what I take with me is a full Linux OS, together with my data and maybe some online passwords saved in the browser.
August 25, 2011
I wanted to explore a different way to encrypt data on portable USB flash drives other than Truecrypt, so I checked what could be done with Linux Unified Key Setup (LUKS). LUKS is an encryption method that is implemented on Linux by “cryptsetup” package, and on Windows by FreeOTFE. It encrypts a partition or a file […]
September 6, 2014
2