background preloader

GPGTools - It's worth protecting what you love

https://gpgtools.org/

Related:  Security/Encryptioncyber securityCryptographie

Server Deployment Instructions · cryptocat/cryptocat Wiki Deploying a Cryptocat server allows you to maintain Cryptocat conversations on your own network, without relying on the network at crypto.cat. Our network is pretty reliable, we invite everyone to use it - but it's cool to set up your own network too! :-) Overview You basically just need to set up a XMPP-BOSH server with MUC (XEP-0045) and In-Band Registration (XEP-0077) enabled, and then have a front-facing HTTPS proxy for it. Hacking the Internet - bringing down infrastructure Why should hackers try to disable computers when they might be able to set their sights higher? Routers can be just as vulnerable as servers, so why not bring down the entire Internet? The US Department for Homeland Security (DHS) was set up in November 2002 with the primary responsibility of protecting the USA and its territories from terrorist attacks, accidents, and natural disasters. However, its remit has slowly spread in recent years to cover the nation's Critical National Infrastructure, which includes the structure of the Internet itself. Surprisingly perhaps, the DHS has never really got to grips with raising the security of the Internet's own architecture – the integral global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users worldwide.

VeraCrypt Portable free disk encryption VeraCrypt is a free disk encryption utility allowing you to both encrypt full physical drives and make encrypted logical volumes. VeraCrypt requires admin rights to operate. Version 1.19 for Windows, Multilingual 6MB download / 31MB installed (Details) - Support VeraCrypt development

backdooring your javascript using minifier bugs In addition to unforgettable life experiences and personal growth, one thing I got out of DEF CON 23 was a copy of POC||GTFO 0x08 from Travis Goodspeed. The coolest article I’ve read so far in it is “Deniable Backdoors Using Compiler Bugs,” in which the authors abused a pre-existing bug in CLANG to create a backdoored version of sudo that allowed any user to gain root access. This is very sneaky, because nobody could prove that their patch to sudo was a backdoor by examining the source code; instead, the privilege escalation backdoor is inserted at compile-time by certain (buggy) versions of CLANG. That got me thinking about whether you could use the same backdoor technique on javascript.

VoIP: voicing security concerns Channelling voice calls over IP networks has brought many advantages to enterprise communications, but it also creates some security risks. Though Voice over Internet Protocol (VoIP) services are available for both consumer and business markets, it is from the latter that most enthusiasm for it has come; for this reason, it is also where most of VoIP's security issues occur. While the commercial sector has, of course, invested heavily in protecting their data networks from other cyber threats, IP-based voice has been somewhat overlooked. CrypTool 2 What is CrypTool 1 CrypTool 1 (CT1) is an open-source Windows program for cryptography and cryptanalysis. It’s the most wide-spreaded e-learning software of its kind. What is CrypTool 2? CrypTool 2 (CT2) is an open-source program offering an innovative visual programming GUI to experiment with cryptographic procedures and to animate their cascades.

hackme: Deconstructing an ELF File A friend recently asked me to find the password for a little hard-to-hack program he had written and I agreed to it. The short journey of a few hours that led me to its password were extremely interesting and this article describes the process as well as some of the new techniques learnt along the way. Few minutes after accepting his challenge, I received a binary called "hackme" in an E-mail and I got started! Those interested in giving it a shot can download the binary file and get back to this article later.

Online Visual Traceroute Map Data Map data ©2016 Google, INEGI Map Satellite Visual traceroute may have misplaced routers. Cryptainer LE Secure your data and ensure absolute privacy with Cypherix's, Cryptainer LE. It's powerful 448 bit encryption, creates multiple 100 MB encrypted drives (vaults) on your hard disk. These encrypted disk drives can be loaded and unloaded when needed. An Encrypted Internet Is a Basic Human Right Nico Sell is co-founder and co-chairman of Wickr Inc. This Op-Ed is part of a series provided by the World Economic Forum Technology Pioneers, class of 2015. Sell contributed this article to Live Science's Expert Voices: Op-Ed & Insights. George Washington could have become a king, but instead devoted his life to giving power back to the people. This is why his political heritage remains so strong today, inspiring millions around the world to continue striving for liberty and democracy. One of my favorite U.S. presidents, Washington proved that great leaders rule by empowering the people, not by usurping power.

Quantum cryptography: using photons to create secure keys It is essential that cryptography remains well ahead of the hackers, and that's precisely the motivation for a project that uses the quantum mechanical properties of photons to create tamper-proof keys. The future for the protection of sensitive data could be bright. Researchers have uncovered evidence that the quantum mechanical properties of photons (light particles) may be used to generate tamper-proof keys, and this represents a big leap forward in the fight against computer hackers and other cyber-security threats. Four and a half years ago, the EU-funded Secure Communication based on Quantum Cryptography (SECOQC) consortium successfully demonstrated long-distance, practical quantum-key distribution (QKD) in a fibre-optic network around the Austrian capital Vienna. Battelle says that it is already in talks with organisations interested in using the technology.

Challenger Raise your chances to the level of the experts. A unique process to encrypt data puts you in the position to be able to use your own individual encryption method. The synchronized Stream cipher uses at its core a key constructed using an unusually long random number list. The resulting extremely large number of possible combinations delivers an ideal and inexhaustible encryption supply. 25 Hardening Security Tips for Linux Servers Everybody says that Linux is secure by default and agreed to some extend (It’s debatable topics). However, Linux has in-built security model in place by default. Need to tune it up and customize as per your need which may help to make more secure system. Linux is harder to manage but offers more flexibility and configuration options. Securing a system in a production from the hands of hackers and crackers is a challenging task for a System Administrator. This is our first article related to “How to Secure Linux box” or “Hardening a Linux Box“.

Infrastructure cyber attack threat grows Despite high-profile attacks, there is still a lack of IT security in key public infrastructure. We ask if it will take a major meltdown to prompt governments to take action. It is almost a year now since the attack on the control system of an Iranian nuclear reactor by the Stuxnet virus. However, despite this ominous development and recent reports that the threat of attacks has increased, a worrying amount of vital public infrastructure is still vulnerable.

Related: