tostado: encryption + security

Sort by: Date / Title / URL

  1. There are an increasing number of projects working on next generation secure email or email-like communication. This is an initial draft report highlighting the projects and comparing the approaches. Please help us fill in the missing details and correct any inaccuracies. To contribute to this document, fork this repository and issue a pull request.
  2. There is now an effort underway to restart the Lavabit project, however, which might be a good opportunity to take a critical look at the service itself. After all, how is it possible that a service which wasn’t supposed to have access to its users’ email
    05-11-2013 to , , and -1 others
  3. Spurenarm Surfen mit Mozilla Firefox, E-Mails verschlüsseln mit Thunderbird, Anonymisierungsdienste nutzen und Daten verschlüsseln für WINDOWS + Linux
    01-08-2013 to , , and -1 others
  4. The fourth Circumvention Tech Summit (CTS) will take place Sept 29 to Oct 1 in Berlin. CTS events are designed to increase dialog and cooperation between privacy tool developers, community activists, journalists and other stakeholders interested in improv
    14-07-2013 to , , and -1 others
  5. Bring fire to the people. LEAP is a non-profit dedicated to giving all internet users access to secure communication. Our focus is on adapting encryption technology to make it easy to use and widely available.
    04-09-2012 to , , and -1 others
  6. All you need to do is installing dropbear (a tiny SSH server) and BusyBox (a tiny shell, usually already installed) using apt-get. The initrd will be recreated automatically. Then reboot your computer.
    17-06-2011 to , , , and -1 others
  7. arver is a tool to manage encrypted harddisks. Imagine you are a collective with several admin members. Your servers have diffrent LUKS encrypted devices. Either you would need 1 password for every device which everyone needs to know or you use arver! Arver has 1 password for each device and for each member. This password is stored encrypted with the personal gpg-key in the data directory. The admins only need to know the password to the their own gpg secret key.
    11-06-2011 to , , and -1 others
  8. Our approach is different to the default encryption built into distributions such as Ubuntu and Fedora because we don't leave the /boot partition unencrypted on the hard disk. We move it to a bootable USB key along with a far more secure key to unlock the hard disk.
    06-10-2010 to , and -1 others
  9. Provide a default location for users to securely store sensitive data using filesystem encryption.
    21-10-2008 to , , and -1 others
  10. Infos rund um Verschlüsselungsmethoden
    23-09-2008 to , , and -1 others

First / Previous / Next / Last / Page 1 of 2