Very strange, my money is on the dev(s) preventing the software to be compromised by a secret subpoena, a serious (physical) threat or something...
I was actually wondering about the certificate security a few days ago. Let's say a certification authority is breached for some reason, even then...
That's some good news. Auditing encryption code is one of the hardest things to do so I'm glad someone finally does it.
Some good comments above me. For me, Google is still a necessary evil, their search engine is top notch, people still send me messages through...
Very nice writeup. I've partially read an advanced guide and I'm impressed with your knowledge. I think this setup is way too complicated for...
The regular "highest standards security " bla bla. E-mail can never be totally secure, the future lies within alternatives, such as bitmessge,...
After using AirVPN for the last few months I'm using Mullvad since a few weeks. Although it works better than before, it still has the same issues...
Probably too busy at moments. I think they need more exit nodes at peak times.
Re: NSA slideshow on 'The TOR problem It is possible (and easy) to start Tor and let Chrome connect to the Tor socks proxy running locally on...
Why are people so careless about the US storing fingerprints and even handprints? That's one of the reasons I don't travel to the US. For me,...
It was never about stopping crimes or bombings. It's always about power and money, criminals and attacks are what the NSA really wants because...
From the Bitlocker Wikipedia page, we can all be absolutely sure now this is an invalid statement: According to Microsoft sources,[18][19]...
Adobe Flash is riddled with security flaws, just check security advisories. Some of these will be accidental but other flaws are just too stupid...
My personal experiences: I have to use UDP because my router limits TCP speeds to 200KB/s. Might be worth remembering if you get slow speeds! -...
Thanks for the links, it seems the setup I outlined above is (almost) waterproof
Right, that's impossible, assuming they have dedicated or VPS servers with root access. Looks like another site with good intentions, but lacking...
Intereseting finds, however the VPN provider Mullvad (which I also use) has this to say: Do you obey the EU Data Retention Directive? No, it...
Overall good first post, but how do you know they keep logs? It says nowhere in the linked posts that logs are kept.
I'm looking to store some files online in a safe way. I mailed several providers and one of them pointed me to the following advice in their...
I run OpenVPN from a bash script. After openvpn exits the bash script automatically puts the network interface down. Here is the script if you...
You can configure Chromium to use the TOR proxy. The main difference is the Firefox TOR bundle wipes your history after you close the window, it...
I certainly see good uses for Tor, but I have to agree with @nerdstein that Tor is very slow. For general webbrowsing, you'll get plenty of...
If you use a strong password AES cannot be broken right now. Maybe in the future a weakness will arise although this is unlikely. If you use AES...
Nice list, some interesting programs on there.
If something goes wrongs, let's say your VPN connection drops and your firewall rules that block outgoing traffic without a VPN fail (for example...
Separate names with a comma.