Email clients – small, secure, privacy-friendly

Suggestions for email clients that are small (not a suite), secure, privacy-friendly For use on Win7 This is an on going topic at Wilders Security Forums. Great information from [most of the ] people that know what they’re talking about. I would not even begin to suggest an email client as all our needs are

Astoria – a new Tor client

Research by American and Israeli academics has lead to the development of Astoria, a new Tor client specifically designed to spoil spooks’ traffic analysis of the surveillance-dodging network. Astoria all-but decimates the number of vulnerable connections on the Tor network, bring the figure from 58 per cent of total users to 5.8 per cent, the

Tracking Phone Location – IMEI

Every mobile phone, GSM modem or device with a built-in phone / modem has a unique 15 digit IMEI number. Based on this number, you can check some information about the device. To find the IMEI, type *#06# into your device like you would to make a call. Press send, and the IMEI will appear

Everybody has something to hide

Following on from yesterdays post … A woman at a gym tells her friend she pays rent higher than $2,000 a month. An ex-Microsoft employee describes his work as an artist to a woman he’s interviewing to be his assistant—he makes paintings and body casts, as well as something to do with infrared light that’s

Big Brother is getting bigger

Under the guise of protecting us from the “holy trinity” – terrorists, criminals and paedophiles [who are also criminals but have their own category for the shock value] –  governments are increasingly overstepping their electoral mandates with the introduction of repressive legislation. We have all heard their [bullshit] theory of “if you have nothing to

ESET AV Remover

ESET AV Remover is a free portable program for Windows that has been designed to uninstall antivirus programs. Note: ESET AV Remover supports many programs and versions but it sometimes lacks support for the latest versions of antivirus programs. In addition to that, it may only be able to remove 32-bit or 64-bit versions of

BitLocker 101

BitLocker on Windows 10 is backward compatible. There are numerous reasons why using native Windows functionality is beneficial over third party solutions. In the case of TrueCrypt (a software I previously used years before with decent success) you are forced to install a program that requires additional configuration and another dependency that has to run

Eighth Movie-Plot Semifinalists

It was April, and time for another Movie-Plot Threat Contest. This year, the theme is Crypto Wars II. Strong encryption is evil, because it prevents the police from solving crimes. (No, really — that’s the argument.) FBI Director James Comey is going to be hard to beat with his heartfelt litany of movie-plot threats. Not

Fujitsu iris-scanning Android

Iris-scanning technology promises to kill the password with the launch of a new smartphone that looks into users’ eyes to unlock it. This new smartphone uses an infrared LED and a special camera to snap a picture of the iris of a person’s eye. The phone recognises the hidden unique pattern of the iris, which


« usbkill » is an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your computer.  The project is still under development but it does work and is effective. Expect improvements to come. Custom commands for when a USB change is observed will be implemented. Here’s the actual

Find or destroy

Someone has stolen your device, and because you are a dick, the contents was not encrypted. You can do one or both of the following – search and find or destroy – but neither is bullet proof. Search and Find There is no shortage of software that tracks a stolen/lost computer – or mobile. I will

The Computers are Listening

Most people realize that emails and other digital communications they once considered private can now become part of their permanent record. But even as they increasingly use apps that understand what they say, most people don’t realize that the words they speak are not so private anymore, either. Top-secret documents from the archive of former

Ask An Expert

Over the course of your work, have you ever attempted to recover the contents of a hard-drive that had been “securely” wiped (that is, had the entire drive written with 1’s or 0’s once or more)? If so, were you successful? No Has the rise of SSDs given rise to any new tools or thwarted

VPN – Freedome vs iVPN

I tried to watch “Last Week Tonight with John Oliver: Government Surveillance (HBO)” on YouTube but was unable to. Why? Because “The uploader has not made this video available in your country”. I’m not sure what the big deal was, but this sort of annoyance is easy to bypass. I used Freedome from F-Secure. I wanted to test


VeraCrypt adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. VeraCrypt also solves many vulnerabilities and security issues found in TrueCrypt. As an example, when the system partition is encrypted, TrueCrypt uses PBKDF2-RIPEMD160 with 1000 iterations whereas in VeraCrypt we use 327661. And for