background preloader

TrueCrypt, the final release, archive  

TrueCrypt, the final release, archive  
Yes . . . TrueCrypt is still safe to use. Google is generating a false-positive alert Recent attempts to download the TrueCrypt files here, using Chrome or Firefox (Mozilla uses Google's technology), have been generating false-positive malware infection warnings. They must be false-positives because no change has been made to the files since this page was put up nearly a year ago (May 29th, 2014) and many people have confirmed that the downloaded binaries have not changed and that their cryptographic hashes still match. Also, the well-known and respected “VirusTotal” site, which scans files through all virus scanners reports ZERO hits out of 57 separate virus scan tests: VirusTotal scan results. We have no idea where or why Google got the idea that there was anything wrong with these files. The mistake these developers made was in believing thatthey still “owned” TrueCrypt, and that it was theirs to kill. But that's not the way the Internet works. TrueCrypt's creators may well be correct.

https://www.grc.com/misc/truecrypt/truecrypt.htm

Related:  securityprotection donnees personellesopen sourceEncryption and Back Doors

DNS Security Collaborative Post - Eric Helgeson There was a ton of responses to my blog post about my ISP’s bad behavior with DNS and I wanted to consolidate the information here. This post is on github so you can click here to add or edit any info in this post, just a pull request away (just follow the same formatting). I’ll be adding more as I parse through all the comments. Basics of DNS What is DNS Think of a DNS as a phonebook from the days of old.

Free Software on the final frontier: GNU Radio controls the ISEE-3 Spacecraft The International Sun-Earth Explorer-3, or ISEE-3, was launched in 1978 by NASA to monitor activity on the sun. After three years of observation, NASA repurposed the satellite, which soon became the first spacecraft to visit a comet. The mission ended in 1999, when NASA abandoned ISEE-3 to orbit the Sun, despite the fact that twelve of the satellite's thirteen instruments were still working.

NSA can tap into BlackBerry, iOS, and Android systems The US National Security Agency (NSA) can access data on smart phones using the world’s most popular systems including iOs, Android, and even BlackBerry – which markets itself to be highly secure, according to a new report. The NSA has tapped into all the leading mobile operating systems to gain access to contact lists, SMS traffic, notes, and users’ current and past locations, Der Spiegel reported, citing internal NSA documents. The leaked information also revealed that the NSA has organized a working group for each operating system. The groups are responsible for clandestine operations to gather data saved on the phones.

Tails amnesia, noun: forgetfulness; loss of long-term memory. incognito, adjective & adverb: (of a person) having one's true identity concealed. Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no trace unless you ask it to explicitly. It is a complete operating system designed to be used from a DVD, USB stick, or SD card independently of the computer's original operating system.

Open Source Comes to Campus/In a Box - OpenHatch wiki This page is deprecated. See the website for up-to-date info. Open Source Comes to Campus In a Box is our attempt to make this event easy for other people to adapt and run. On the NSA Let me tell you the story of my tiny brush with the biggest crypto story of the year. A few weeks ago I received a call from a reporter at ProPublica, asking me background questions about encryption. Right off the bat I knew this was going to be an odd conversation, since this gentleman seemed convinced that the NSA had vast capabilities to defeat encryption. And not in a 'hey, d'ya think the NSA has vast capabilities to defeat encryption?' kind of way. No, he'd already established the defeating.

Mission Impossible: Hardening Android for Security and Privacy Updates: See the Changes section for a list of changes since initial posting. The future is here, and ahead of schedule. Come join us, the weather's nice. This blog post describes the installation and configuration of a prototype of a secure, full-featured, Android telecommunications device with full Tor support, individual application firewalling, true cell network baseband isolation, and optional ZRTP encrypted voice and video support. ZRTP does run over UDP which is not yet possible to send over Tor, but we are able to send SIP account login and call setup over Tor independently. Returning to Free Software: A Guide A month or two ago, I made a conscious decision that I would return to using as much Free Software as possible. The PRISM debacle of the last week confirmed my fears and reasoning, and so I made the decision to accelerate the schedule. Here’s what I did, and how you can, too. My GNU/Linux Background The first computer I ever used was an Apple machine, and at various times in my life I’ve used GNU/Linux as my main OS.

Related: