Encryption

A Tor Browser Might Not Be Your Best Solution for Internet Privacy

I’m very privacy-minded. I’ve written quite frequently about securing your browser and network on the Mac. I figure it’s about time to give the …

Security

A Trick That Hides Censored Websites Inside Cat Videos

The technique uses popular sites as camouflage for banned ones.<p>A pair of researchers behind a system for avoiding internet censorship wants to deliver banned websites inside of cat videos. Their system uses media from popular, innocuous websites the way a high schooler might use the dust jacket of …

Sociology

Top 5 Facts About Tails OS

<b>When it comes to being secure on the internet, users can take many different precautions. Those users who are slightly more “paranoid” about their</b> …

Linux

Protect Your Business from Online Threats by Securing Your Website - Arrow Digital

Recently the number of instances of website hacking and spam have been on the rise. Now more than ever, business owners aren’t just worrying about …

Security

The Winklevoss’ Bitcoin Fund Is Back From the Dead - Motherboard

When the US Securities and Exchange Commission denied the Winklevoss twins' application to open a bitcoin fund on the markets in early March, it was a crushing blow to morale in bitcoinland.<p>On Monday, in a move that is once more igniting the hopes of bitcoiners, the SEC announced that it's …

Cryptography

World War II Can't Save 'Call of Duty' - Motherboard

It's a great time to make a video game about shooting Nazis, so Activision's official reveal of <i>Call of Duty: WWII</i> today makes a lot of sense.<p>Few games have a better Nazi-shooting pedigree, but bringing the gigantic and struggling first person shooter franchise back to WWII isn't going to magically …

Cryptography

'Anomalies' in Queensland police handling of crime statistics 'corrected'

Queensland's police commissioner says "all anomalies" in crime data have been corrected after an auditor-general report found officers were …

Justice

Customer Data From Encrypted Phone Company Ciphr Has Been Dumped Online - Motherboard

The industry for so-called encrypted or secure phones is a lively one. Several firms sell custom BlackBerry or Android devices that may come pre-loaded with tools such as PGP email for sending messages, and some of these companies' products have allegedly been used by organized crime.<p>But it's also …

Security

RoboForm 8 Everywhere

Were you using a password manager 16 years ago? If so, chances are good it was the venerable RoboForm, because there weren't many other choices back …

Apps

Government Flickr Page that Used to Show Wilderness Now Only Shows Oil Drilling - Motherboard

America's environmental agencies have made an about-face since Donald Trump became president—and not just policy-wise.<p>The Bureau of Land Management (BLM), an Interior Department agency that manages 247.3 million acres of public lands, used to have a spectacular Flickr page. And by that, I mean it …

Oil

IoT, encryption, and AI lead top security trends for 2017

A new Forrester report identified the top 14 cybersecurity trends for enterprises to watch in 2017.<p>The Internet of Things (IoT), encryption, and …

Cybersecurity

Toronto FC player salaries for 2017

Toronto FC player salaries for 2017, as released by the MLS Players Union, as of April 15, 2017.<b>Club</b><b>Name</b><b>Pos</b><b>Base Salary</b><b>Compensation</b>TOROyvind …

Soccer

How To Get Siri To Read Out Your WhatsApp Messages

A new update for WhatsApp on iOS will make iPhone users’ life easier — users with iOS 10.3 on their iPhone can get Siri to read out their WhatsApp …

iOS

A Guide To The Climate Change Deniers In Congress - Motherboard

5886b75caa9e32457b1650aa<p>https://motherboard.vice.com/en_us/topic/a-guide-to-the-climate-change-deniers-in-congress<p>A Guide to the Climate Change Deniers in Congress<p>a-guide-to-the-climate-change-deniers-in-congress<p>0<p>0<p>0<p>1421167

Climate

Here's an IRS Contract With a Dark Web Intel Firm - Motherboard

The taxman is on the dark web.<p>Or, more accurately, the Internal Revenue Service has paid contractors to scour the dark web on the agency's behalf.<p>According to public records and a document obtained by Motherboard via the Freedom of Information Act, the IRS paid $65,000 for services from Flashpoint, …

Security

Encrypted Chat Took Over. Let’s Encrypt Calls, Too

By Lily Hay Newman for WIRED.<p>As end-to-end encrypted messaging apps have exploded in popularity, several well-known services have added encrypted calls as well. Why not, right? If it works for text-based chat, voice seems like a natural extension. If only it were that easy.<p>Encrypting calls has …

Security

Encrypt and check your secrets into git

When it comes to managing secret tokens, whatever you do someone will come out and say you’re doing it wrong and propose an alternate solution. On …

Security

Funding for the Tor Project reached a record $3.3 million in 2015

Last year was a challenging one for the Tor Project, the non-profit organization beyond the anonymous global network. Prominent developer Jacob Applebaum stood down following allegations of sexual mistreatment, an ugly saga that resulted in the appointment of a new board of directors and the …

Security

Lifetime Subscription, Save 96%

We have a great deal on the VPN.asia: Lifetime Subscription in the Geeky Gadgets Deals store today, you can save 96% off the normal price.<p>The …

Streaming Media

How to Improve Your Online Privacy as a Journalist?

Cryptography

About | Organize, find, and remove emails you don't need

Mailbox access on your terms<p>Gmail uses a protocol called OAuth2 to control access your Gmail mailbox. You "grant" CleanEmail access to your mailbox …

Security

Colorado's Climate Change Deniers - Motherboard

Rep. Scott Tipton (R-CO-03)<p><i>"Here in the state of Colorado as our tree rings demonstrate, we've had droughts long before there were very many people here."</i><p>Man-made climate change is an issue that, if acknowledged, would "divide America," Rep. Scott Tipton said.<br>[ThinkProgress]<p>Call him: (202) 225-4761 …

Cryptography

The Top 50 unsolved encrypted messages: 34. Unsolved nomenclator messages

<i>For centuries nomenclators were the most popular kind of encryption. Still today messages enciphered with a well-designed nomenclator are hard or</i> …

Security

Geeks vs government: The battle over public key cryptography

<b>Two graduate students stood silently beside a lectern, listening as their professor presented their work to a conference.</b><p>Usually, the students would want the glory. And they had, just a couple of days previously. But their families talked them out of it.<p>A few weeks earlier, the Stanford researchers …

Cryptography

Enterprises have accelerated adoption of encryption strategies

Escalating threats accelerate encryption deployments: Thales Global Encryption Study<p>Enterprises have accelerated adoption of encryption strategies, …

Security

In Response to Guardian’s Irresponsible Reporting on WhatsApp

Speaking of The Guardian, it’s now the last week of April and they <i>still</i> haven’t issued a retraction of their grievously irresponsible story alleging …

Cryptography

Twitter’s the Only Tool You Need for Tracking the Military - Motherboard

Steffan Watkins has spent days meticulously correcting Twitter users on the details of a Russian Air Force training flight in international airspace; a training flight that somewhat alarmed US media outlets.<p>"They aren't coming to your home, they're in international airspace; did nobody tell you …

Cryptography

Top 10 Developer Crypto Mistakes

After doing hundreds of security code reviews for companies ranging from small start-ups to large banks and telcos, and after reading hundreds of …

Cryptography

My cryptologic life after death experiment: Can I take a cryptographic key with me?

<b>British parapsychologist Robert Thouless published a cryptogram and tried to transmitt the key after his death. I have started a similar experiment –</b> …

Security

Winning the debate on encryption — a 101 guide for politicians

<i>This piece was written by PI Research Officer</i> <i>Eva Blum-Dumontet</i><i>.</i><p>Dear Politicians,<p>With elections coming up and quite a few cringe-worthy comments that …

Security