Tags » Encryption

Security: FUD vs. Reality

First off, we need to define FUD to those who are unaware of the acronym. FUD means “Fear, uncertainty and doubt.” The term’s been solidified and used in the last quarter century but the tactic has existed for much longer than tat. 583 more words


Apple iCloud's Two-Step Verification - Why It Didn't Stop Hackers.

Apple Says It Is “Actively Investigating” Celeb Photo Hack, by Arik Hesseldahl,


Apple said Monday it was ‘actively investigating’ the violation of several of its iCloud accounts, in which revealing photos and videos of prominent Hollywood actresses were taken and posted all over the Web.

380 more words
Legal Technology

Update: Calculating a SSH Fingerprint From a (Cisco) Public Key

I think there’s more interest for my program to calculate the SSH fingerprint for Cisco IOS since Snowden started with his revelations.

I fixed a bug with 2048 bit (and more) keys. 28 more words

My Software

How to Encrpt a Drive in Linux

1. Format the device with Luksformat so we can use the device.

$sudo cryptsetup luksFormat /dev/sdd


2 Set up device mapper.  Luks will handle the encryption and decryption.

161 more words

Real phone security - not kill switches

There has been a lot of chatter recently ( e.g. here ) about phone kill switches since governor Jerry Brown (CA) signed a bill (amended SB 962) that requires kill switches in smartphones starting July 2015.    489 more words

How to Encrypt Everything | Gizmodo

[T]he Electronic Frontier Foundation EFF and Fight for the Future—offers instructions on how we can all avoid mass surveillance. But it also offers a “Privacy Pack” for the average user. 120 more words