The first edition of Cobbler (“Mono”) is now available. I wrote it as I did not feel comfortable with either cloud-based or local, browser integrated password managers. Cobbler looks just like a standard text editor, but it can store any type of sensitive information in a tiny fixed-size encrypted and authenticated container. Examples of sensitive […]
There’s a lot of excitement about Bitcoin and crypto currencies. Optimists claim that Bitcoin will fundamentally alter payments, economics, and even politics around the world. Pessimists claim Bitcoin is inherently broken and will suffer an inevitable and spectacular collapse. Underlying these differing views is significant confusion about what Bitcoin is and how it works. We […]
Over the past few years you’ve seen the Tor Project’s name pop up in the news on more than one occasion. With a core mission of “advancing human rights and freedoms by developing free and open anonymity and privacy technologies,” it’s easy to understand why in this day and age. One of those technologies is […]
When you protest for a cause, alongside thousands of people, it is very likely that the mobile network will stop working on everyone’s smartphone. This happens because there are too many smartphones in a small space and the mobile network can’t handle so many connections from the same place. When this happens, you can no […]
Even as the encryption app Signal became the go-to private communications channel for activists, journalists, politicians, and more, its encrypted calling feature remained less than perfect. It lacks video, often drops calls, and doesn’t always integrate with your phone’s existing features. A Signal update gradually rolling out now upgrades the calling features and adds video, […]
Microsoft pushed patches to devices running Windows 7 and 8.1 in recent time that collect information and transfer data to Microsoft regularly. One of the main issues that Windows users may have with telemetry is that Microsoft does not reveal what it is collecting, and what is included when telemetry data is transferred to the […]
People think that a VPN keeps them anonymous while online. People are more often than not wrong. What a VPN, any VPN, can actually offer is a method of securing your connectivity and making it much harder for an attacker (be that a hacker or the government) from intercepting your data whilst in transit.
Encryption keeps some of your most vital data safe. It protects your credit card information from being stolen by anyone eavesdropping on your Internet traffic when you make purchases online. It’s also used to keep medical information secure, protect free speech, and defend against surveillance. Increasingly, encryption is becoming widely available by default on consumer […]
At a dedicated phone forensics facility in Tulsa, Okla., the Secret Service breaks into about 40 phones a year that could contain valuable information related to criminal investigations. When it comes to breaking into phones, it’s tougher to access devices that aren’t as popular as iPhones or Samsungs, according to investigators. Most forensics technology developers […]
You’ve probably read the news articles. If you haven’t, please see the following: https://cyngn.com/blog/cyanogen-services-shutting-down So, yes, this is us. LineageOS will be a continuation of what CyanogenMod was. This is the definition of open. A company pulling their support out of an open source project does not mean it has to die.
Due to the uptick of illegal activities being conducted with the help of anonymity via the dark web, law enforcement agencies all over the world have turned their attention and revamped their efforts in dealing with cybercrime. However, the ability of law enforcement agencies to effectively combat internet crime is affected by the widespread adoption […]
Tired of unchecking unrelated offers while installing software? Have you ever felt, while installing software, that the installer tries to push additional unwanted programs at all cost? Ever missed a checkbox, and spent hours afterwards removing adware? Ever opened your browser after an installation, only to find out that you have a new homepage, a […]
In recent years, a growing number of data breaches have resulted from the improper data removal and insecure storage of drives. It should be noted that almost all drive makers have secure erase or sanitize utilities for their drives. Don’t for get that formatting is not the same as erasing. Apply full disk encryption prior […]