Notices tagged with crypto, page 15
-
nqn1n (nqn1n)'s status on Tuesday, 09-Sep-2014 11:36:28 EDT nqn1n Leute, hier gibt es Gruppen, denen ihr folgen könnt. Z. B. !crypto - !antifa - oder !katzen und viele mehr ;-) -
igor (igor)'s status on Tuesday, 09-Sep-2014 09:56:32 EDT igor cc !crypto -
gitju (gitju)'s status on Tuesday, 09-Sep-2014 01:11:34 EDT gitju Bonne journée !wissen !debian !crypto !qvitter !machinecoin !single !illuminati !katzen !witze !kaffee -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 01-Sep-2014 19:44:09 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca @thegrugq writes "Operationally secure email is not much more difficult than normal email, it just requires a little more attention to detail, some changes to default settings, and consistent discipline." Erm, "attention to detail" and "consistent discipline" is what makes operationally secure email way too hard for most people. Never mind about the awful user interface. https://gist.github.com/grugq/03167bed45e774551155 !crypto -
pettter ✅ (pettter)'s status on Monday, 25-Aug-2014 05:41:27 EDT pettter ✅ I would still argue caution in using JSCrypto in general, but yes, several libraries have gone from "untested - do not use" to "has survived trials reasonably well", though none is at the "trusted" stage imo. Environment and transport is also a huge concern when it comes to JSCrypto. !crypto -
lnxw48 (Linux Walt) (lnxw48)'s status on Monday, 25-Aug-2014 05:35:25 EDT lnxw48 (Linux Walt) Just a couple of years ago, everything I saw said “DANGER DO NOT USE about #JSCrypto. Now libs like this are popping up all over. http://url.federati.net/Kriw4 !crypto #keybase
-
Markus Kilås (netmackan)'s status on Thursday, 21-Aug-2014 16:32:32 EDT Markus Kilås How to exploit NSA flawed random generator in TLS !crypto http://ur1.ca/i14dd -
Markus Kilås (netmackan)'s status on Tuesday, 19-Aug-2014 16:01:47 EDT Markus Kilås How to break the Internet: Cory Doctorow at TEDxOxbridge #Snowden #hollyweb !security !crypto https://www.youtube.com/watch?v=aAWCN0Jed8g -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 15-Aug-2014 22:30:04 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca @Aruna runs the #Toronto #UbuntuHour, @Genii runs the !Ubuntuca Release Parties, we just missed the @GTALUG meeting this past Tuesday, there's the @FreeGeekToronto group that builds computers with !FreeSoftware, @HackLabTO where they do all kinds of !FreeHardware and !FreeSoftware stuff, and I want to meet with the @TorontoCrypto people who organized the !CryptoParty last month. Fo… -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 15-Aug-2014 22:01:15 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca ♻ Christopher Soghoian @csoghoian: If you're using Tor on !Linux and aren't using @micahflee's Tor Browser Launcher, you're easy prey for FBI malware. https://github.com/micahflee/torbrowser-launcher/ » !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 15-Aug-2014 20:51:13 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Time to plan a joint !LibrePlanet !CryptoParty #UbuntuHour! cc/ @Aruna @TorontoCrypto !Ubuntuca -
Markus Kilås (netmackan)'s status on Wednesday, 13-Aug-2014 17:16:05 EDT Markus Kilås #Maven still runs insecure binaries directly off the net by default !crypto !security http://ur1.ca/hywne http://ur1.ca/huuio -
morph (morph)'s status on Tuesday, 12-Aug-2014 04:30:50 EDT morph @aqeeliz I must say I haven’t tried any of the plenty upcoming new secure messengers for several reasons. Just BitMessage so far which lacks a mobile client. The TOX seems interesting. It is decentralized and the project’s websites try to offer information about it while others just have cute graphics and point out that their application is “secure”. -
aqeeliz (aqeeliz)'s status on Tuesday, 12-Aug-2014 03:28:44 EDT aqeeliz Has anyone here tried Tox? http://tox.im !crypto -
qbi (qbi)'s status on Tuesday, 05-Aug-2014 18:37:32 EDT qbi Malicious SHA-1: https://malicioussha1.github.io/ von @veorq und anderen !crypto #hash #MalSHA1 -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 04-Aug-2014 13:59:27 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca I stopped reading about halfway through because it was all speculation and conjecture lacking any evidence at all http://miniver.blogspot.co.uk/2014/07/how-secure-is-tor.html #TOR !Crypto !surveillance -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 04-Aug-2014 13:41:30 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca I read this yesterday, and I've been thinking about it. Nothing new for those of us who've been following #TOR for some time. But I'm a little surprised at the glibness the article attributes to Roger Dingledine http://pando.com/2014/07/16/tor-spooks/ !crypto !surveillance -
zoowar (zoowar)'s status on Wednesday, 30-Jul-2014 11:44:46 EDT zoowar Tor security advisory: "relay early" traffic confirmation attack !crypto !darknet https://indy.im/url/5761678 -
Markus Kilås (netmackan)'s status on Monday, 28-Jul-2014 12:46:50 EDT Markus Kilås Do Government Websites Care About HTTPS? Not in 2010, wonder if it is better now? #ssl #tls !crypto #infosec https://t.co/id4ViuvhFk -
kat (boneidol)'s status on Saturday, 26-Jul-2014 16:54:12 EDT kat awesome #fail !crypto http://www.cryptofails.com/post/87697461507/46esab-high-quality-cryptography-direct-from-linkedin