tostado: encryption + security

Sort by: Date / Title / URL

  1. All you need to do is installing dropbear (a tiny SSH server) and BusyBox (a tiny shell, usually already installed) using apt-get. The initrd will be recreated automatically. Then reboot your computer.
    17-06-2011 to , , , and -1 others
  2. Our approach is different to the default encryption built into distributions such as Ubuntu and Fedora because we don't leave the /boot partition unencrypted on the hard disk. We move it to a bootable USB key along with a far more secure key to unlock the hard disk.
    06-10-2010 to , and -1 others
  3. with an Unbuntu alternate Install CD
    04-08-2008 to , , and -1 others
  4. Infos rund um Verschlüsselungsmethoden
    23-09-2008 to , , and -1 others
  5. This software is compatible with Linux encrypted volumes (e.g. LUKS, cryptoloop)
  6. The fourth Circumvention Tech Summit (CTS) will take place Sept 29 to Oct 1 in Berlin. CTS events are designed to increase dialog and cooperation between privacy tool developers, community activists, journalists and other stakeholders interested in improv
    14-07-2013 to , , and -1 others
  7. There is now an effort underway to restart the Lavabit project, however, which might be a good opportunity to take a critical look at the service itself. After all, how is it possible that a service which wasn’t supposed to have access to its users’ email
    05-11-2013 to , , and -1 others
  8. 14-06-2006 to , and -1 others
  9. arver is a tool to manage encrypted harddisks. Imagine you are a collective with several admin members. Your servers have diffrent LUKS encrypted devices. Either you would need 1 password for every device which everyone needs to know or you use arver! Arver has 1 password for each device and for each member. This password is stored encrypted with the personal gpg-key in the data directory. The admins only need to know the password to the their own gpg secret key.
    11-06-2011 to , , and -1 others
  10. There are an increasing number of projects working on next generation secure email or email-like communication. This is an initial draft report highlighting the projects and comparing the approaches. Please help us fill in the missing details and correct any inaccuracies. To contribute to this document, fork this repository and issue a pull request.

First / Previous / Next / Last / Page 1 of 2