Encrypting Instant Messaging Conversations

Whenever you talk online with your instant messaging (IM) client of choice, your conversations can be, and in all probability are, recorded, monitored, and read. Any data which travels over a network can be viewed using programs known as packet sniffers, with some specially crafted programs..

read more | digg story

Advertisements

Why I wrote PGP

This short essay is old (1991/1999), but it is just as relevant today as it was back then. Phil Zimmermann shares his views on privacy as a basic right.

read more | digg story

Germany Cracks Down on Tor Node Operators

German police are currently raiding server rooms all over Germany, and seizing TOR servers on the basis that they are trafficking child pornography.

read more | digg story

Bruce Schneier Facts… Funny and Smart

Its a little known fact that if you change the SSID of an unprotected WIFI connection to BRUCESCHNEIER, it becomes completely secure….SSL is invulnerable to man-in-the-middle attacks. Unless that man is Bruce Schneier….Bruce Schneier once factored a prime number.

read more | digg story

Locking up Linux: Creating a Cryptobook

Linux kernel version 2.6.4 introduced an improved cryptographic infrastructure that enables relatively easy and secure containment of sensitive data at many levels of software. There are block-level encryption infrastructures like those provided by the Linux Unified Key Setup (LUKS), and user-space implementations like those in the EncFS and CryptoFS file systems, themselves based entirely on the Fast Userspace File System (FUSE) for Linux. Of course, any crypto system is ultimately only as strong its passwords or keys.

read more | digg story

Brightnets vs. Darknets

The Owner-Free Filing system has often been described as the first brightnet; A distributed system where no one breaks the law, so no one need hide in the dark. OFF is a highly connected peer-to-peer distributed file system. The unique feature of this system is that it stores all of its internal data in a multi-use randomized block format. In other words there is not a one to one mapping between a stored block and its use in a retrieved file. Each stored block is simultaneously used as a part of many different files. Individually, however, each block is nothing but arbitrary digital white noise.

read more | digg story

PGP Founder Phil Zimmermann and BorderWare Join Forces to Secure VoIP

BorderWare Technologies Inc., and PGP founder Phil Zimmermann, industry leaders in IP communications security, privacy and compliance solutions, today announced an agreement to make BorderWare the first commercial licensee of Zfone, secure VoIP media encryption software, created by Zimmermann.

read more | digg story