Notices tagged with crypto, page 19
-
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Saturday, 05-Apr-2014 20:54:38 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca You should put that on the !Cryptoparty web site — By date: https://www.cryptoparty.in/parties/upcoming By location: https://www.cryptoparty.in/location -
patrickniedzielski (patrickniedzielski)'s status on Saturday, 05-Apr-2014 18:04:21 EDT patrickniedzielski I'll be giving a talk on #PGP and its uses as well as running a keysigning party this Thursday at #Cornell. Slides will be posted following the talk. !crypto !privacy -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 04-Apr-2014 23:41:20 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Someone just told me about I2P, "Invisible Internet". Anybody have experience with it? !crypto !privacy -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Thursday, 03-Apr-2014 16:36:36 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Not only can you not trust anything for which you don't have source code, but you can't trust anything you didn't forge yourself from atomic particles… http://people.umass.edu/gbecker/BeckerChes13.pdf "Stealthy Dopant-Level Hardware Trojans" by George T. Becker et al. !crypto !surveillance -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Monday, 31-Mar-2014 14:17:55 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Don't see how #Mylar is any different from other client-side encryption like GnuPG or OTR. But how can encrypted data be searchable without leaking its contents? http://www.theregister.co.uk/2014/03/27/mit_students_publish_encryption_paper/ !crypto !surveillance -
kuro (kuro)'s status on Wednesday, 26-Mar-2014 06:51:21 EDT kuro @textkonstrukte Welcome! Es gibt hier im #floss #fediverse groups für !CC !fs und !openaccess, !security, !crypto etc. -
patrickniedzielski (patrickniedzielski)'s status on Tuesday, 25-Mar-2014 20:20:40 EDT patrickniedzielski @bobjonkman I recently set up a new, 4096-bit RSA key (A66F 5099 CC43 0B02 5B53 D0B9 7F2A 9552 DEBF A176) similar to the way described here: https://alexcabal.com/creating-the-perfect-gpg-keypair/ Differences: I have the master private key on an encrypted flash drive, my subkeys expire, and I don't have a photo in the key. -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Tuesday, 25-Mar-2014 20:09:23 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca My key uses DSA and it's difficult to set GnuPG to do digest hashing with anything other than SHA1 and still expect compatibility. That, more than the key length, is making think of generating another key. 0xD2CCE5EA !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Tuesday, 25-Mar-2014 16:20:27 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca The !Cryptoparty folks are busy creating global wikis and mailing lists; get ready to party! -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Tuesday, 25-Mar-2014 15:39:09 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca I hope you're !selfhosting if you're doing !crypto on a server! -
kuro (kuro)'s status on Tuesday, 25-Mar-2014 11:31:19 EDT kuro AWS urges developers to scrub #GitHub of secret keys http://qttr.at/cd9 !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Saturday, 22-Mar-2014 16:12:25 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca ♻ @TorontoCrypto: The quickest way to protect your web browsing habits: @EFF's own #HTTPSEverywhere. https://www.eff.org/https-everywhere #infosec !CryptoParty #encrypt -
kuro (kuro)'s status on Saturday, 22-Mar-2014 15:43:42 EDT kuro @boneidol Very good technical standards met: http://qttr.at/ccb -
kat (boneidol)'s status on Saturday, 22-Mar-2014 14:44:40 EDT kat !Crypto 101 - https://www.crypto101.io/ this is good. And it has a cool .io domain -
zoowar (zoowar)'s status on Friday, 21-Mar-2014 02:16:01 EDT zoowar WPA2 wireless security cracked !crypto !darknet http://phys.org/news/2014-03-wpa2-wireless.html -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Sunday, 16-Mar-2014 13:51:11 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca BBC News: Who is winning the 'crypto-war'? http://www.bbc.com/news/magazine-26581130 Hint: It's not us… !surveillance !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Tuesday, 11-Mar-2014 15:22:06 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca Tonight: @GTALUG has a Formal Keysigning! https://torontocrypto.org/TorontoCrypto:Current_events !Cryptoparty -
qbi (qbi)'s status on Sunday, 09-Mar-2014 18:32:49 EDT qbi Wer GnuTLS auditieren will, findet hier ein paar Hinweise: http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/7361 !crypto -
whistlewright (whistlewright)'s status on Thursday, 06-Mar-2014 14:16:45 EST whistlewright I wonder how large a pain it will be to get #tor on the #Lemote !crypto -
Kitchener Waterloo Linux User Group (kwlug)'s status on Monday, 03-Mar-2014 21:11:19 EST Kitchener Waterloo Linux User Group Suddenly, there's lots of !crypto discussion on the merits and techiques of signing packages