What’s in your travel bag? A laptop filled with data? An external HDD filled with even more data? There’s bound to…
Tag: encryption
Blackphone, privacy centric device
Do you want a phone that is privacy centric? Would you like a handset that genuinely tries to transmit and receive your…
The PirateBox, Revisited
In a previous post, I showcased the PirateBox, an anonymous offline mobile file sharing and communication system. While it was a fascinating…
One VPN to rule them all
If you want to anonymize your Internet traffic, one of the most common solutions available is to use a commercial VPN…
DissidentX a Steganography Tool From Bittorrent Creator
Bram Cohen, better known for bringing us the BitTorrent protocol, much maligned as public opinion more often than not associates it with piracy,…
Encryption is Loud and the Walls Have Ears
Seems like the interest in computer communication via sound is taking another peak in interest now that researchers discovered a way…
Malwarebytes 2013 Threat Report
The past year turned out to be an interesting introduction into the new types of threats users are facing as well…
Cryptolocker ransomware: what you need to know
Update 06/02/2014: Today the US Department of Justice (DOJ) announced an effort to disrupt the Gameover Zeus Botnet. In addition to this…
In computers, are random numbers really random?
Sometimes it is necessary to use random numbers in programs. Depending on the need, it can be important how random the…
With the latest NSA allegations, can we still trust encryption?
The New York Times and the Guardian published news stories last week alleging that the National Security Agency (NSA) spent billions of…