Vanish

Time flies like an arrow - Fruit flies like a banana

End-to-end email encryption

A seamless, easy-to-use, and secure end-to-end encrypted business collaboration tool with no central point of attack is a holy grail for everyone. The main challenge is the tension between end-to-end encryption and ease of use, which manifests itself in many ways. This is why they had to come up with new techniques that permit key […]






How Many Americans The NSA Spied On

America’s top intelligence official is reneging on a promise made under the Obama administration to estimate how many Americans have been spied on using a warrant-less surveillance law intended to target foreigners. The decision to abandon that commitment isn’t sitting well with civil liberties advocates who formed a coalition this week in protest. Director of […]






Key to better cryptography

Are current random number generators ‘good enough’ or should we use quantum technology to achieve better randomness for crypto keys? Usually when the subject of quantum computing comes up, it’s all rather future-gazing stuff. However, during the Infosecurity Europe 2017 show, one company launched a quantum technology derived product that’s very much here and now: […]






Tor Browser 7.0

A new version of Tor Browser, a Firefox-based web browser with Tor functionality added to it, has been released on June 7, 2017. Tor Browser 7.0 introduces support for Firefox’s multi-process architecture e10s and content sandboxing as the major new features of the release. But, it’s not all peaches and cream. The comments section is […]






Freenet

Freenet is a peer-to-peer platform for censorship-resistant communication and publishing. The anonymity tool, therefore, implements tactics to protect data integrity and prevent anonymity or privacy leaks while providing redundant data availability. Each Freenet participant runs a node that provides the network some storage space. Freenet – from Wikipedia Introduction to Freenet – https://www.deepdotweb.com  






Is that a Stingray in your pocket?

Stingrays, also known as cell-site simulators or IMSI catchers, have become a powerful but little-understood tool for law enforcement surveillance. In the absence of publicly available stingray information, the University of Washington researchers tried a new technique to find out more. How does this help us? Sadly, it doesn’t. At the moment it locates [maybe] a […]






10 best Linux distros…

… for privacy fiends and security buffs in 2017. The awesome operating system Linux is free and open source. As such, there are thousands of different ‘flavours’ available – and some types of Linux such as Ubuntu are generic and meant for many different uses. But security-conscious users will be pleased to know that there are […]






Improving Linux Security

Ask people who run IT departments these days what keeps them up at night, and they’ll probably tell you it’s security—or the lack of it. With the explosive growth of malicious attacks on everything from hospitals to Fortune 500s, security — not hardware, software and even staff — is what currently makes life miserable. That’s […]






Vanish © 2016       All information on this blog, unless otherwise noted, is hereby released into the public domain, with no rights reserved. Frontier Theme