I have wondered similar things. One option I was thinking about was to backup to NAS that was under control from of the backup software. For...
A fun project but probably not very useful in the long term. All it would take to defeat this would be to add random delays to the outgoing...
Who are you trying to hide TOR from? Family member, corporate IT, or three letter agency? If you think someone might do a low level scan of your...
Yes, the mathematics of cracking a password are only relevant if the password has high entropy. The problem is that password cracking tools are...
This point seems to always get lost when discussing this or that crypto software. If, for example, Microsoft decided to add code to Windows that...
Your encryption speed will be most likely CPU limited and not drive speed limited. You could create a 1 gig file container and time how long it...
Of course there are laws that treat these things differently but that doesn't mean much to me personally. Google didn't employ any special...
Kind of creepy that they recorded all that data but is it really a crime? If I put a sign in my front yard with my name, DOB, SS#, etc... and...
I wonder how hard this would be to fake? A flesh colored patch over your carotid arteries (or forehead?) that pulsed a signature via Liquid...
If you encrypt the entire pendrive partition, and insert into a random Windows machine you will, as you know, be prompted to format because...
In software the only thing you can do is create a hidden container inside another. As per the instructions in TrueCrypt and VeraCrypt, you can...
https://www.cnet.com/features/amazons-helping-police-build-a-surveillance-network-with-ring-doorbells/ Having video available to help police can...
The answer to your question is not simple. First, I am pretty sure that hyberfil.sys is encrypted as part of the system. However, if you have...
To clarify, data is always encrypted on the disk. When data is read into memory it is decrypted and when data is written to disk it is encrypted....
Depending on the sophistication of the virus, it may be pointless to open sandboxed or in a VM. Virus makers are starting to run tests on the...
The problem with backdoors is not very likely in the encryption software but is certain to be in Windows. At least that is why I believe...
Bit of a stretch maybe? The biological immune system goes through a process during fetal development where the immune system "learns" how to...
It is impossible to hide large amounts of encrypted data. By definition, it appears as random (high entropy) data. You can scan the entire hard...
This is a digital Scarlet Letter
Maybe not anytime soon but eventually... What worries me is that this homomorphic system is so much more complicated than encryption as most of...
Just another example of the limitations of biometric authentication. Until someone builds a scanning device that reads a passwords directly from...
LED data is true line of sight. You have to know where it is and then be in the light beam to pick up anything. The article says a single LED...
Should be part of privacy standards. For example, a retailer could refuse to sell a laptop that didn't conform to the standard wiring of...
Yep, not sure if it the question that was stupid or the people answering. Pretty much every employer has wording in the employment contract that...
Yep, eventually someone will get the code and create a program to apply the watermark to any image. Digital signatures and trusted sources are the...
Separate names with a comma.