background preloader

Cryptography

Facebook Twitter

Numerology and the Illuminati | Dr. Donald Ryles Paranormal & Unusual Blog---#1 Google Ranked. The Ultimate Internet Survival Kit. … primarily collected for non-techie activists and campaigners, but will be useful to anybody interested in protecting their online privacy and security. Ultimate? Well, not really. It is a moving target. That’s why it’s a “kit” and it will keep changing. If you wish to protect yourself from governmental (and corporate) spying, know about the internet’s concealed interests. Whatever service or tool you choose, Terms and Conditions May Apply, and (depending on your context and purpose) do not make yourself stand out like a “Big Red A-Team Tank Vehicle” on the internet highway: Browsers talk too much.

Email It is unlikely that PGP (GPG) encryption will protect your emails from the NSA, although there are plenty of examples of law enforcement unable to break PGP encryption, and then trying to force them to hand over their keys. Disposable Email To avoid spam and send one-time only messages, for example for registrations, you can use a disposable email address. Browsers Search Engines Social Media. Tor Project: Anonymity Online. The Freenet Project - /index. The Freenet Project - /index. The Free Haven Project. GNUnet | GNU's Framework for Secure Peer-to-Peer Networking. FreedomBone. If you want to have more control over how you interact on the web, and regain your freedom, privacy and autonomy from outside interference, you need to start moving towards using programs like GNU Social – Jason Self For a microblog you will need a separate domain/subdomain, so see Setting up a web site for details of how to create an Apache configuration for your microblog.

If you're using freedns then you will need to create a new subdomain. Install some dependencies: apt-get install php5-xcache php-gettext php5-curl php5-gd php5-mysql Download GNU Social mkdir ~/build cd ~/build wget Verify it. sha256sum gnu-social.tar.gz 1f886241c7f1a175e7be3cccbcb944ab6c03617fb75aefa4d62d37abed87d2b4 Extract the files and set permissions on them, where mydomainname.com is your domain name. Edit the Apache access settings. editor /var/www/$HOSTNAME/htdocs/.htaccess Add the following: Save and exit, then create a database. Add the mailer script to the aliases file: Sylpheed - lightweight and user-friendly e-mail client. TorBirdy :: Add-ons for Thunderbird. NoScript - JavaScript/Java/Flash blocker for a safer Firefox experience! - what is it? - InformAction.

Anonbox :: Chaos Computer Club. Secrets/Spies/Ninjas/Deception/Evil. Cryptanalysis. Close-up of the rotors in a Fialka cipher machine In addition to mathematical analysis of cryptographic algorithms, cryptanalysis also includes the study of side-channel attacks that do not target weaknesses in the cryptographic algorithms themselves, but instead exploit weaknesses in their implementation.

Even though the goal has been the same, the methods and techniques of cryptanalysis have changed drastically through the history of cryptography, adapting to increasing cryptographic complexity, ranging from the pen-and-paper methods of the past, through machines like the British Bombes and Colossus computers at Bletchley Park in World War II, to the mathematically advanced computerized schemes of the present.

Methods for breaking modern cryptosystems often involve solving carefully constructed problems in pure mathematics, the best-known being integer factorization. Overview[edit] Amount of information available to the attacker[edit] Computational resources required[edit] Indicator[edit]