background preloader

Kit de survie numérique

The Enemies of Internet - Special Edition : Surveillance Wikiquote Gnu Privacy Guard (GnuPG) Mini Howto (English): Concepts Next Previous Contents 1. Concepts 1.1 Public Key Encryption Classic methods for encryption only use one key for encryption. The sender encrypts the message with this key. The use of so-called Public Keys can solve this problem. Crucial in this concept is that the secret key remains a secret and should not be given away or become available to anyone else but the owner of this key. 1.2 Digital Signatures In order to prove that a message was really sent by the alleged sender the concept of Digital Signatures was invented. A digital signature is made through a combination of the secret key and the text. 1.3 Web of trust A weak point of the Public key algorithms is the spreading of the public keys. The PGP solution (and because of that automatically the GnuPG solution) exists in signing codes. 1.4 Boundaries to security If you have data that you would like to remain confidential, there is more to it than just determining which encoding algorithm to use.

Digital Encryption and Digital Signatures with GPG | Ubuntu DC LoCo Team For those of you who are unfamiliar with the concept of digital signature and encryption, I hope this tutorial will provide some insight. It is designed to convey the concepts and plays a bit fast and loose with the specifics. (Follow the links for more details than you probably want.) As people become more concerned about the security of e-mail, efforts have been made to improve privacy and guarantee authenticity of various digital media. A popular encryption system created by Phil Zimmermann is known as Pretty Good Privacy (PGP) . These encryption programs use an encryption technique known as public key cryptography . The gist of these systems is that when you encrypt a file, you use a key (i.e., a rule or method of mapping your original file to an encrypted form). Symmetric keys are not considered very secure by today's standards. Fingerprints and Signatures GPG (and PGP) can also be used to sign files and e-mail messages. Well... not exactly. Next: A quick Keysigning Steps overview.

How Secure Is My Password? #opManning In media mythology, the years from the mid-1960s to the mid-’70s were the classical age, a heroic time of moral clarity. Mainstream journalism marinated in adversarialism. Little Southern newspapers infuriated their own readers by staring down segregation. Foreign correspondents forced upon an unwilling public the realities of a brutal war. True, that retelling is a bit of myth-spinning; the media never were quite that gutsy. And over the past decade or so, it’s as if that classical formula of defiance and struggle has been turned upside down. Even Watergate is upended, with Bob Woodward, one of the two Washington Post reporters who exposed the scandal, now the target of scathing revisionism because of a trivial dustup with a thin-skinned White House. And looming above those breathtaking role reversals is the media’s disgraceful abandonment of the boldest news source of his generation, Pvt. Manning, now 25, is before a court martial in Maryland. He was a great source. Like this:

Thirty-Five Arguments Against Google Glass Google Glass is a snazzy set of specs that will part the Red Sea if you tap it from the right angle. It aims to fuse smartphones and computers into a hands-free user experience more pleasurable than sex, religion, and world domination combined. Glass is not yet on the market, but the news of its existence cut a hew through Mountain View with the strident fife of an unpaid piper wooing unsuspecting kids into a dark cave. It inspired Google co-founder Sergey Brin to publicly announce that he felt less male with the thick tools that came before. Some wondered why Brin didn’t just hold hard to his smartphone and slam down shots every Friday night like the rest of America. Brin was good enough to describe his new instrument to the Wall Street Journal last September: They are, uh, a new form of computing, uh, that’s designed to really free you. Here are thirty-five arguments against Google Glass: ARGUMENT ONE It could destroy whatever shreds of privacy we have left.

Philosophy and Philosophers - Ready Reference Center at Middletown Thrall Library - Web Research, Websites, Internet Resources Featured Resources DK Eyewitness Companion: Philosophy Available to members of Thrall. "Eyewitness Companion: Philosophy covers not only the history of Western thought, but also the traditions of Eastern philosophy and schools of thought from the Indian subcontinent. New Dictionary of the History of Ideas Available to members of Thrall. Opposing Viewpoints in Context Available to members of Thrall. General Philosophy Contemporary Philosophy, Critical Theory and Postmodern Thought Directory of web resources and selected readings. EpistemeLinks "EpistemeLinks includes over 19,000 categorized links to philosophy resources on the Internet and has several additional features." How Stuff Works: Philosophers Includes ancient Greek and Roman philosophers. ImportanceOfPhilosophy.com Topics include: Metaphysics, Epistemology, Ethics, Politics, Esthetics. The Internet Encyclopedia of Philosophy A guide to terminology and people of Western philosophy. An Introduction to Philosophy: An Online Textbook Noesis

Related: