background preloader

Privacy tools - encryption against global mass surveillance □

Related:  Security/EncryptionPrivacyPlotfringe19ronaldjohnskomp

An Encrypted Internet Is a Basic Human Right Nico Sell is co-founder and co-chairman of Wickr Inc. This Op-Ed is part of a series provided by the World Economic Forum Technology Pioneers, class of 2015. Sell contributed this article to Live Science's Expert Voices: Op-Ed & Insights. Tor Browser Download the file above, and save it somewhere, then double click on it. (1) Click "Run" then choose the installer's language and click OK (2). Make sure you have at least 80MB of free disk space in the location you select. If you want to leave the bundle on the computer, saving it to the Desktop is a good choice.

FrootVPN Improvements: UK VPN Server is Officially Here! Internet security software FrootVPN is making its way of giving more and more vpn servers for their subscribers. They started providing the best vpn service since 2014 and made awesome advancement as the years go by. FrootVPN gained 300,000 users for a shorter period of time. They started having two vpn servers which include Sweden and USA. Now, they have a total of five vpn servers.

encryptedPageMaker There is no need to use your own webhost to serve a webpage. You can use this page to generate special URL that loads the page you create. When you have the URL, save it or share it on social media and forums. hackme: Deconstructing an ELF File A friend recently asked me to find the password for a little hard-to-hack program he had written and I agreed to it. The short journey of a few hours that led me to its password were extremely interesting and this article describes the process as well as some of the new techniques learnt along the way. Few minutes after accepting his challenge, I received a binary called "hackme" in an E-mail and I got started! Those interested in giving it a shot can download the binary file and get back to this article later. Do let me know if you find anything interesting along the way that I did not think of or missed!

Five ways to delete yourself from the Internet If you're reading this, it's highly likely that your personal information is available to the public. And while you can never remove yourself completely from the Internet, there are ways to minimize your online footprint. Here are five ways to do so. Be warned however; removing your information from the Internet as I've laid it out below, may adversely affect your ability to communicate with potential employers. Top 7 Tips for Your Android Security There are times when people get to asked me if android phones are secure to use especially with mobile transactions and sending sensitive data using the internet. I don’t really know what to say but it’s up to those people if they want a secure android phone. It’s all about how you take good care of it and the way you use it.

backdooring your javascript using minifier bugs In addition to unforgettable life experiences and personal growth, one thing I got out of DEF CON 23 was a copy of POC||GTFO 0x08 from Travis Goodspeed. The coolest article I’ve read so far in it is “Deniable Backdoors Using Compiler Bugs,” in which the authors abused a pre-existing bug in CLANG to create a backdoored version of sudo that allowed any user to gain root access. This is very sneaky, because nobody could prove that their patch to sudo was a backdoor by examining the source code; instead, the privilege escalation backdoor is inserted at compile-time by certain (buggy) versions of CLANG. That got me thinking about whether you could use the same backdoor technique on javascript. JS runs pretty much everywhere these days (browsers, servers, arduinos and robots, maybe even cars someday) but it’s an interpreted language, not compiled.

Probably the Best Free Security List in the World Security List Index Select a Security Category: All Items Keys Discontinued or not updated recently (for at least three years). If there are both free and paid versions, this key applies only to the free version. 9 Internet Security Tips for Small Business Whether you have small business or big company to maintain, you also need to focus on things that keep you from operating and earning your profits. Let us talk about how small businesses should have an Internet security. Like other big companies in the industry, they should care for their data and internal information. Since most enterprises uses technologies such as computers, Internet, mobile phones and other gadgets for the daily office tasks, some hackers are into targeting them because they think that a small business has no capability to focus in securing their information online. Once your small business’s data and personal information got stolen, then the worst thing that you’ll have to face is to close it and end up being bankrupted. Do you have a small business to protect its Internet security?

Server Deployment Instructions · cryptocat/cryptocat Wiki Deploying a Cryptocat server allows you to maintain Cryptocat conversations on your own network, without relying on the network at Our network is pretty reliable, we invite everyone to use it - but it's cool to set up your own network too! :-) Overview You basically just need to set up a XMPP-BOSH server with MUC (XEP-0045) and In-Band Registration (XEP-0077) enabled, and then have a front-facing HTTPS proxy for it. For this setup, we recommend the following software: