Notices tagged with crypto, page 4
-
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Wednesday, 16-Nov-2016 01:29:48 EST Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca ♻ @slashdot Cryptsetup Vulnerability Grants Root Shell Access On Some Linux Systems http://m.slashdot.org/story/318821 ¶ !crypto !security via @HackerFantastic on #Twitter -
harald (harald)'s status on Friday, 28-Oct-2016 14:52:53 EDT harald Ah, it’s been a long time since I heard this one: http://www.bobrivers.com/index.php/crypto/
!crypto #song #humour -
benfell (benfell)'s status on Sunday, 23-Oct-2016 12:38:29 EDT benfell !crypto and !gnupg #GnuPG's decision to rely on #pinentry is a catastrophe. I've been one of the die-hards, faithfully signing all my emails. Now I can't find a client that will work properly with GnuPG version 1 or 2. Yes, that includes #mutt . -
Kitchener-Waterloo Cryptography Interest Group (kwcrypto)'s status on Wednesday, 19-Oct-2016 04:55:36 EDT Kitchener-Waterloo Cryptography Interest Group ♻ @VeraCrypt_IDRIX #VeraCrypt 1.19 is out with fixes and enhancements. Big thanks to @quarkslab for their good audit and to @OSTIFofficial for funding it. ¶ via #Twitter !crypto -
Kitchener-Waterloo Cryptography Interest Group (kwcrypto)'s status on Wednesday, 12-Oct-2016 16:19:27 EDT Kitchener-Waterloo Cryptography Interest Group Tomorrow (14 Oct 2016) @isislovecruft is presenting at the Centre for Applied Cryptographic Research at @UWaterloo https://blog.torproject.org/events/isis-lovecruft-speaking-university-waterloo !crypto !Tor -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Tuesday, 11-Oct-2016 00:28:31 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca ♻ @CopperheadOS: CopperheadOS development will be scaled back to doing work that is funded. This means that there are *temporarily* only security updates. ¶ !crypto !android -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Sunday, 09-Oct-2016 03:22:00 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca @zlg Full !GnuPG fingerprints are best, long KeyIDs (8 octets) are still good, short KeyIDs are definitely broken. I wonder how long it will take for an arbitrary 8-octet #KeyID to be easily generated... !crypto -
Markus Kilås (netmackan)'s status on Tuesday, 04-Oct-2016 15:44:55 EDT Markus Kilås @kwlug @mcscx does it then follow that a future quantum computer breaking classical !crypto could solve world peace...? ;) -
Kitchener Waterloo Linux User Group (kwlug)'s status on Monday, 03-Oct-2016 19:37:48 EDT Kitchener Waterloo Linux User Group "If you could reverse !crypto you would be able to solve hard problems we know are not possible". eg. World Peace -
Kitchener Waterloo Linux User Group (kwlug)'s status on Monday, 03-Oct-2016 19:35:33 EDT Kitchener Waterloo Linux User Group Now Nik Unger gives some background info on Public Key Cryptography. !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Saturday, 01-Oct-2016 05:16:26 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca @ladams@gs.sdf.org You're not using a mere 4 octets to identify a GnuPG key, are you? Recently I learned that short keyID collisions are now trivial to create, and the keyservers are full of fake short keyIDs. Please check out https://lkml.org/lkml/2016/8/15/445 and https://news.ycombinator.com/item?id=12296974 !crypto !GnuPG /cc @thomask@gs.sdf.org -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Friday, 30-Sep-2016 14:09:50 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca ♻ @Borisuithetbos #Snowden likes #Signal more than #Whatsapp or #Telegram but better #LibreSignal without Google Play on #CopperheadOS https://fdroid.eutopia.cz/ ¶ via @DarknetJ on #Twitter !crypto !fdroid -
Markus Kilås (netmackan)'s status on Sunday, 25-Sep-2016 07:06:49 EDT Markus Kilås SignServer 4.0.0 has been released! #FLOSS #DigitalSignatures #TimeStamping !crypto !security https://signserver.org http://qttr.at/1hop -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Thursday, 08-Sep-2016 11:46:47 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca @openpgp_conf Will there be video of the presentations? !GnuPG !crypto -
arunisaac (arunisaac)'s status on Thursday, 01-Sep-2016 15:00:54 EDT arunisaac GNU #Taler -- Electronic payments for a liberal society! https://taler.net/ !fs !crypto !privacy !anonymity !decentralife -
Kitchener-Waterloo Cryptography Interest Group (kwcrypto)'s status on Friday, 19-Aug-2016 02:46:13 EDT Kitchener-Waterloo Cryptography Interest Group ♻ @IntersectionsKW 13 Sep next meetup at @Boltmade w/ pizza frm @Sortable on !crypto in a post quantum world & !opendata for esl simulator -
lnxw48 (Linux Walt) (lnxw48)'s status on Tuesday, 16-Aug-2016 13:23:03 EDT lnxw48 (Linux Walt) My !gnupg fingerprint is 42B4 390B 4833 92F1 AC1E E524 860D 1BA5 E830 3CE6 !crypto -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Tuesday, 16-Aug-2016 12:36:17 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca If you've experienced a short ID collision it would help to publish your PGP fingerprint here. !crypto !GnuPG -
Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca (bobjonkmanformer)'s status on Thursday, 11-Aug-2016 11:10:26 EDT Former Bob Jonkman -- Please use the new server at https://gs.jonkman.ca The Silence app is needed on both sides for encrypted texting. If the sender doesn't have the key for the recipient then a key exchange message is sent automatically, followed by the encrypted message. If the recipient doesn't have the Silence app then the message is sent in plaintext. I don't know the details of the key exchange, or what overhead the key probing incurs. !crypto -
arunisaac (arunisaac)'s status on Friday, 05-Aug-2016 05:28:40 EDT arunisaac !privacy !crypto Don't the signatures on #PGP public keys in a web of trust give away the social graph?