Category: encryption

wie privatsphäre online verbessern mit tor und kostenloser vpn firmware für router / How to protect privacy online with tor and free vpn firmware for routers – how to setup tor node / Как защитить конфиденциальность онлайн с помощью tor и бесплатной прошивки vpn для роутеров – как настроить tor узел / Як захистити конфіденційність в Інтернеті за допомогою tor і безкоштовної прошивки VPN для маршрутизаторів – як налаштувати вузол tor / Cómo proteger la privacidad en línea con tor y firmware vpn gratuito para enrutadores: cómo configurar el nodo tor / Comment protéger la confidentialité en ligne avec tor et le firmware VPN gratuit pour routeurs – comment configurer le nœud tor / 如何使用路由器的tor和免费VPN固件在线保护隐私 – 如何设置tor节点
31.03.2022

0) for security: keep all internet connected devices as up to date as possible! “Freifunk updates its router firmware and closes a critical security vulnerability that could allow attackers to install their own firmware on the devices” (src: heise.de) Also […]

1984 mass surveillance: for a better world? – trust – mass surveillance – and why is there so much violence on TV? – the trust problem between gov and citizens needs to be addressed – Trump to end all encryption? – short version summary of 1984
05.04.2020

scroll down and behave! (slaves of digital dictatorships) short version summary of 1984: short version: 1984 needs to be avoided at any cost. because: it is evil. (Google did not drop it’s motto “don’t be evil” for nothing) in essence: […]

04.04.2020

https://theintercept.com/2020/04/03/zooms-encryption-is-not-suited-for-secrets-and-has-surprising-links-to-china-researchers-discover/ hm…. let me think where one has seen this before: TELEGRAM! Zoom’s service is “not suited for secrets” “The researchers also found that Zoom protects video and audio content using a home-grown encryption scheme, that there is a vulnerability […]

Post-Quantum Cryptography
03.04.2020

Videos: ssh thanks for sharing even when the audio is pretty crappy. slides (hard to read on video) can be found here: https://degabriele.info/slides/SSH_CCS_16.pdf “dropbear” is ambedded ssh server Made in Australia (wiki) also available as Android App naming: a “dropbear” […]

Russian IT Security Updates 2020-01
13.01.2020

now WITH SPICY COMMENTS X-D SecurityLab, [22.12.19 12:40] A Twitter user using the alias 08Tc3wBB created tfp0-an exploit that allows you to jailbreak the latest iPhone models with IOS 13.3. The functionality of the exploit has already been confirmed by […]

quantum computing and a universe wide wireless communication network faster than the speed of light
12.08.2019

Why is quantum computing important: optimization Update: Google claims to have reached quantum supremacy The tech giant unveiled its x-quantum computer chip Bristlecone in March 2018 (src: cnet) original nasa paper: https://drive.google.com/file/d/19lv8p1fB47z1pEZVlfDXhop082Lc-kdD/view book: https://deepai.org/machine-learning/researcher/eleanor-g-rieffel https://www.amazon.com/Quantum-Computing-Introduction-Engineering-Computation/dp/0262015064 Scott’s Supreme Quantum Supremacy FAQ! […]

backdoors in hardware – Intel Anti Theft Brick Code
16.12.2018

https://youtu.be/70Blz9hyAz8 While “backdoors” in hardware sound like a good idea… you don’t know how hackers are using it to sabotage infrastructure or extort bitcoins of another country’s companies… see “backdoor in cisco router“. IT IS F**** DANGEROUS! ESPECIALLY if it […]

10.07.2017

you should setup harddisk encryption during setup. to add an encrypted /home partition afterwards might be possible but a lot more effort. scroll very down if you want to know how to encrypt an usb sticks … needless to say […]

gpg cheat sheet – encrypting files with gpg
08.06.2017

Warning! while gpg is very likely sound and solid encryption – what is far more likely to be compromised is YOUR HARDWARE – every network card – wifi card – usb UMTS G3 modem – PCI-Card – contains enough RAM […]

GNU Linux -> How to Install TrueCrypt / VeraCrypt / ZuluCrypt
10.09.2016

Veracrypt command line usage: manpage: veracrypt.man.txt # start interactive command line wizard veracrypt -t -c # to create a new encrypted volume or usb stick Volume type: 1) Normal 2) Hidden Select [1]: # dismount all volumes currently mounted /usr/bin/veracrypt […]

Getting started with PGP
29.02.2016

PGP stands for “PGP is the short form for Pretty Good Privacy” how it works: it is an encryption system that allows data to be encrypted with an world-known public key, then savely transported to the intended receiver and only […]

26.02.2016

stuff: GNU Linux -> How to Install TrueCrypt / VeraCrypt / ZuluCrypt Veracrypt command line usage: manpage: veracrypt.man.txt # start interactive command line wizard veracrypt -t -c # to create a new encrypted volume or usb stick Volume type: 1) […]

19.03.2015

checkout https://dwaves.de/2016/02/26/is-truecrypt-insecure/ and successor: https://sourceforge.net/projects/veracrypt/files/ vim /usr/bin/nautilus #!/bin/bash # set your filemanager here filemgr=thunar # set your webbrowser here, usually x-www-browser should be perfect webbrowser=x-www-browser ### DO NOT CHANGE ANYTHING BELOW HERE unless you know what you’re doing ### oldparams=$@ […]

05.02.2015

update: 2020-02: First of: thanks! PGP + enigmail + Thunderbird is is working great on for example: GNU Debian Linux 10. And setup now can be done by normal users. (the enigmail wizard is pretty nice) THANKS ALL INVOLVED 🙂 […]

27.10.2014

SSLv3 is older than my daughter, but is still supported by all major browsers. The latest crypto bug is a MITM (man in the middle) attack that could allow anyone with a network device (WiFi router) sitting between browser users […]