Notices tagged with crypto, page 24
-
!Crypto #Fail — Telegram's Cryptanalysis Contest - http://www.cryptofails.com/post/70546720222/telegrams-cryptanalysis-contest
-
@cmhobbs I haven't rooted this one yet but I have only used apps from fdroid. I haven't even put email on here. Mumble, XMPP, a text editor, & the tor stuff are all I have on it now. android crypto
-
♻ @grote Wow, the crowd-funding for @gnupg is already at 61%. We need easy to use !crypto, so please consider donating as well http://goteo.org/project/gnupg-new-website-and-infrastructure
-
Presidential Panel to NSA: Stop Undermining Encryption !crypto !darknet https://indy.im/url/5758005
-
@bobjonkman Thanks for correcting my group posting.
-
♻ @johnnynull #GnuPG Crowdfunding to commence: http://blog.gnupg.org/20131213-preparing-for-launch.html !privacy !crypto graphy
-
So a verification scheme thats extensible?
-
Twitter applies forward-secrecy http://news.cnet.com/8301-1009_3-57613517-83/twitter-upping-security-to-thwart-government-hacking/ !infosec !security !crypto
-
No, !GNUsocial should not force TLS. Although I'm a big fan of !crypto and !security, the current state of global PKI doesn't inspire confidence, and I'm not going to participate in that. We know that certificates can be spoofed, and we know that "they" have infiltrated Certificate Authorities and major sites to subvert what we believe is secure. Instead, we need a system that does…
-
It looks like his keyserver gives you his key, whatever you ask for
-
gpg --keyserver hkp://imperialviolet.org:8080 --recv-keys 00000000 --> WTF? @gnupg verfiziert Antwort nicht. /via @agl__ !crypto !security
-
... also introduces some basic !crypto ideas
-
#Cryptoparty in Toronto tonight, 8pm at @loscafetaleros, 774 College St. https://torontocrypto.org !crypto
-
@bobjonkman Thanks for this. But unless I missed something, that was Intel, not Linus. Though I admit this borders nit-picking.
-
Confirmed! I just ran across this piece from Theodore Ts'o: https://news.ycombinator.com/item?id=6336505 TL;DR: Intel's hardware RNG is compromised by NSA's SIGINT, but Linus Torvalds insisted it be used to generate /dev/random (via http://blog.cryptographyengineering.com/2013/12/how-does-nsa-break-ssl.html ) !crypto !surveillance
-
On my way to the KWLUG meeting to set up for my !Crypto presentation. Should be fun! http://sobac.com/wiki/index.php/Encrypting_E-mail_with_GnuPG,_Thunderbird_and_Enigmail
-
Reminder: E-mail me you Public Key if you want to participate in the Formal Keysigning. We'll also have an informal keysigning for people who are creating their first keys during the demonstration. Bring your fingerprint strips created with gpg-key2ps http://sobac.com/wiki/index.php/Formal_Keysigning http://sobac.com/wiki/index.php/Informal_Keysigning !Crypto
-
Tonight 7pm: @BobJonkman demonstrates !Crypto with Thunderbird and Enigmail, & holds a Formal keysigning http://kwlug.org/node/909
-
Tonight 7pm: @BobJonkman demonstrates !Crypto with Thunderbird and Enigmail, & holds a Formal keysigning http://kwlug.org/node/909
-
@0xabad1dea These are great! Can I use them in my !Crypto presentation on Monday? http://sobac.com/kwcrypto/kwlug-2013-12-02/#s555