tostado: encryption + security

Sort by: Date / Title / URL

  1. Spurenarm Surfen mit Mozilla Firefox, E-Mails verschlüsseln mit Thunderbird, Anonymisierungsdienste nutzen und Daten verschlüsseln für WINDOWS + Linux
    01-08-2013 to , , and -1 others
  2. arver is a tool to manage encrypted harddisks. Imagine you are a collective with several admin members. Your servers have diffrent LUKS encrypted devices. Either you would need 1 password for every device which everyone needs to know or you use arver! Arver has 1 password for each device and for each member. This password is stored encrypted with the personal gpg-key in the data directory. The admins only need to know the password to the their own gpg secret key.
    11-06-2011 to , , and -1 others
  3. The fourth Circumvention Tech Summit (CTS) will take place Sept 29 to Oct 1 in Berlin. CTS events are designed to increase dialog and cooperation between privacy tool developers, community activists, journalists and other stakeholders interested in improv
    14-07-2013 to , , and -1 others
  4. Provide a default location for users to securely store sensitive data using filesystem encryption.
    21-10-2008 to , , and -1 others
  5. This software is compatible with Linux encrypted volumes (e.g. LUKS, cryptoloop)
  6. with an Unbuntu alternate Install CD
    04-08-2008 to , , and -1 others
  7. Bring fire to the people. LEAP is a non-profit dedicated to giving all internet users access to secure communication. Our focus is on adapting encryption technology to make it easy to use and widely available.
    04-09-2012 to , , and -1 others
  8. Our approach is different to the default encryption built into distributions such as Ubuntu and Fedora because we don't leave the /boot partition unencrypted on the hard disk. We move it to a bootable USB key along with a far more secure key to unlock the hard disk.
    06-10-2010 to , and -1 others
  9. There is now an effort underway to restart the Lavabit project, however, which might be a good opportunity to take a critical look at the service itself. After all, how is it possible that a service which wasn’t supposed to have access to its users’ email
    05-11-2013 to , , and -1 others
  10. There are an increasing number of projects working on next generation secure email or email-like communication. This is an initial draft report highlighting the projects and comparing the approaches. Please help us fill in the missing details and correct any inaccuracies. To contribute to this document, fork this repository and issue a pull request.

First / Previous / Next / Last / Page 1 of 2