background preloader

Syncthing

https://syncthing.net/

Related:  Technology

Anonymous VPN Providers? 2016 Edition (Page 2) ~ TorrentFreak You can read the introduction (page 1) here. 1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user of your service? If so, what information and for how long? 2. Free as in Speech, Fair as in Trade Virgil Dupras2010-09-30 Update 2015-01-02: Fairware has been phased out for a while now so a couple of references made in this article don't make much sense anymore... But the plan was still a sound one :)

Wipe Files with BCWipe - Jetico Inc. Oy Benefits & Advantages Prevent costly data leakage and avoid risking sensitive data falling into the wrong hands BCWipe is designed to surgically remove all traces of unwanted files beyond recovery. BCWipe will wipe selected files, folders and Data Remanence, Wipe Free Space, Wipe File Slack space, Wipe Temporary Files, wipe system-specific data and more. Sophisticated wiping for anyone’s peace of mind Customer Support Top Links language switch block English Slashdot The Guardian has released new documents from Edward Snowden showing how the U.S. National Security Agency targets internet anonymity tool Tor to gather intelligence. One of the documents, a presentation titled "Tor Stinks," bluntly acknowledges how effective the tool is: "We will never be able to de-anonymize all Tor users all the time. With manual analysis we can de-anonymize a very small fraction of Tor users, however, no success de-anonymizing a user in response to a TOPI request/on demand." (Other documents: presentation 1, presentation 2.) The NSA is able to extract information sometimes, though, and Bruce Schneier details what we know of that process in an article of his own.

Phasing out fairware Virgil Dupras2013-03-16 When I started my adventure with open sourcing my shareware apps, I had two main goals. First, I wanted to see if it was possible to make money with open source shareware-type apps. Second, I wanted to bring more developers to the projects to ensure their continued existence (and for the fun of it). The first goal, after a few tweaks, was easily reached. 32-Core Intel Skylake EP Xeon E5 2699 v5 Benchmark Surfaces Online Intel has been in the forefront of server CPU design. For decades, the company has provided a number of products that power the servers and perhaps most of the internet. Now, with the impending release of AMD’s Naples server processors, Intel is now forced to up its game when it comes to server products. Intel is rumored to release its Skylake EP Xeon processor anytime soon, nevertheless, a new leak seems to give a bit of detail about the upcoming server processor.

Public-key cryptography An unpredictable (typically large and random) number is used to begin generation of an acceptable pair of keys suitable for use by an asymmetric key algorithm. In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of the private key. In the Diffie–Hellman key exchange scheme, each party generates a public/private key pair and distributes the public key. After obtaining an authentic copy of each other's public keys, Alice and Bob can compute a shared secret offline.

Emerging Technology Trends for 2015 The focus of building the Radar is our bi-annual face-to-face meeting. Before the meeting TABbers are usually talking to plenty of people and thinking about what ought to be blipped. Non-TAB ThoughtWorkers lobby for things they’re interested in, although it's the TAB's Radar, we seek out opinions from lots of sources, inside and outside ThoughtWorks.

Intel Partners With Chinese Company For An ARM Processor Counterpart When it comes to mobile processors, Intel has been shoved in the sideline by the current architecture provider, ARM. For many years, ARM has dominated the mobile industry with its line of mobile processor architectures. So far, almost all phone makers equip their products with a version or combinations of various ARM architectures. However, a recent partnership suggests that Intel is now ready to face ARM head on with its newest Spreadtrum SC9861G-IA SoC mobile processor. The Spreadtrum SC9861G-IA SoC processor is a result of a design partnership between Intel and Spreadtrum. The new mobile processor boasts an eight-core system design that can run at up to 2GHz of clock frequency.

Librem 5 – A Security and Privacy Focused Phone – Purism Freedom of Choice We believe phones should not track you nor exploit your digital life. We are in the middle of a digital rights revolution where you get to decide the future. mib.com - The Facts About MIB MIB ensures that companies can offer – and consumers can purchase – affordable life and health insurance protection. MIB Group, Inc. is a member-owned corporation that has operated on a not-for-profit basis in the United States and Canada since 1902. MIB's Underwriting Services are used exclusively by MIB's member life and health insurance companies to assess an individual’s risk and eligibility during the underwriting of life, health, disability income, critical illness, and long-term care insurance policies. These services "alert" underwriters to errors, omissions or misrepresentations made on insurance applications. By mitigating the risk of applicant errors, omissions and misrepresentations, MIB may help lower the cost of life and health insurance for consumers.

Best external desktop and portable hard disk drives of 2017 Update: We're constantly updating this buying guide to make sure the very latest - and best - external and portable hard drives are included in this list. Even in a world graced with cloud storage, there’s still a place in this world for the best external hard drive. Also known as the hard disk drive or HDD, these spinning trays are the most affordable way to pack a massive amount of storage into your PC.

Related: