background preloader

Boxcryptor - Secure your Cloud.

Boxcryptor - Secure your Cloud.

Related:  _Crypto Tools

Geli (software) geli is a block device-layer disk encryption system written for FreeBSD, introduced in version 6.0. It utilises the GEOM disk framework. It was designed and implemented by Paweł Jakub Dawidek.[1] geli was initially written to protect data on a user's computer in situations of physical theft of hardware, disallowing the thief access to the protected data. This has changed over time with the introduction of optional data authentication/integrity verification.[2] Compare SkyDrive, Google Drive and Dropbox We compare the features of Windows SkyDrive, Google Drive and Dropbox to help you pick the best file storage and sync service for your specific requirements. You have your files, photos and documents on your home computer that you would like to access from other locations on different devices. Dropbox has been the de-facto choice for long but that could potentially change as Microsoft and Google have just entered the arena with the launch of Windows Live SkyDrive and Google Drive respectively. The three services are very similar – you get online storage (you can access your files anywhere) and file synchronization – edit a document on one computer and the changes are propagated to all your other computers almost instantly.

Linux Unified Key Setup - LUKS In computing, the Linux Unified Key Setup or LUKS is a disk-encryption specification created by Clemens Fruhwirth and originally intended for Linux. While most disk encryption software implements different and incompatible, undocumented formats, LUKS specifies a platform-independent standard on-disk format for use in various tools. This not only facilitates compatibility and interoperability amongst different programs, but also assures that they all implement password management in a secure and documented manner.[1] The design of LUKS aimed to conform to the TKS1 secure key setup scheme.[2] See also[edit]

dm-crypt Some Linux distributions support the use of dm-crypt on the root file system. These distributions use initrd to prompt the user to enter a passphrase at the console, or insert a smart card prior to the normal boot process.[3] Frontends[edit] The dm-crypt device mapper target resides entirely in kernel space, and is only concerned with encryption of the block device – it does not interpret any data itself. It relies on user space front-ends to create and activate encrypted volumes, and manage authentication. At least two frontends are currently available: cryptsetup and cryptmount.

Cloud Computing: Microsoft's Viewpoint Successful digital businesses are holistically applying the concepts of mobile, social, and big data to reimagine their business. Cloud creates the connections. Learn More People-focused. Delivering experiences that appeal directly to your employees and partners, increasing their engagement and allowing them to drive maximum productivity. Enterprise-grade.

Can quantum cryptography work in the real world ? Can quantum cryptography work in the real world? By William JacksonOct 28, 2013 Battelle Memorial Institute has built what it claims is the nation’s first production system for quantum distribution of cryptographic keys and announced plans to create a 400-mile link enabling quantum-key distribution (QKD) between Columbus, Ohio, and Washington, D.C., by 2015. Fact or Fiction: Encryption Prevents Digital Eavesdropping. Since the dawn of the Web and ubiquitous free e-mail services over the past two decades, the need to secure personal information online has been evident but often ignored. Last month’s exposure of the U.S. National Security Agency’s PRISM program for collecting data on individuals suspected of plotting terrorist attacks, spying or other forms of malfeasance (pdf) has helped bring privacy issues back into the spotlight. In fact, the news about PRISM even encouraged some prominent Internet pioneers to condemn the practice and call for renewed efforts among Internet users and their service providers to encrypt more data, to protect it from prying eyes. Vint Cerf, Google’s chief Internet evangelist and co-developer of the TCP/IP communications protocol that makes the Internet tick, recently told The Times of London that computer scientists should devise an anti-snooping solution for the Web using encrypted communication. The catch is that users have to actively set up these programs.

Dropbox (service) Due to trademark disputes between Proxy, Inc. and Evenflow (Dropbox's parent company), Dropbox's official domain name was "" until October 2009, when they acquired their current domain, "".[7] OPSWAT reported in their December 2011 market share report that Dropbox held 14.14% of the worldwide backup client market, based on number of installations.[8] In May 2011, Dropbox struck deals with Japanese mobile service providers Softbank and Sony Ericsson. Tools for Cryptography - An ECRYPT II initiative. Welcome to ECRYPT II Tools for Cryptography This website contains a collection of tools related to cryptography. See the overview page for a list of all tools. The about page contains more information on this initiative, and instructions for submitting your own tool. Recently added tools are listed below. Sage S-box MILP toolkit