Well as long as it is beneficial, that is what matters.
I have read this page about it: http://www.zemana.com/product/antilogger/modules/anti-ssllogger.aspx However, this feels like very vague...
I couldn't believe it. I got socially engineered into not reading that with their comment like "This is the most boring step, accept it and move...
https://www.youtube.com/watch?v=6XjCA9q7WsQ This is not speculation, this is even coming directly from their own privacy statement. I cannot...
You have to be careful doing email encryption with clients and plugins, because I have had a reply from someone where they chose to decrypt the...
I have never tried enigmail so I am not sure. But if you are using an email client, you should be safe as long as your client is not storing draft...
Remember 3 letter agencies big thing is meta data. They know who you are contacting, when you contact, how often, the size of the communication,...
You are very welcome. Encryption is really great, if people actually use it. This tutorial should greatly help educating people to be able to make...
https://www.youtube.com/watch?v=6nNibHgbI_w This is a tutorial that is very easy to follow that walks you through the process of creating and...
Here is the benchmark on my system for DiskCryptor: [IMG] Serpent is the most secure algorithm, but it is not the fastest. However in all the...
As promised I have released a tutorial for using the really nice raw CD/DVD encryption feature of DiskCryptor and how easy it is to get access to...
Video link: https://www.youtube.com/watch?v=Df12h6uWzNU (remember to watch in HD/full screen) This tutorial demonstrates the process of taking...
The key file is embedded into the bootloader. You can keep the key file somewhere else so that you can use it for something else or to burn a new...
I am going to say again. Could you be any more vague? I could google for weeks and not come across the specific info you are supposedly hinting...
Could you be any more vague?
How can you say the audit is a waste of time? It is the definitive method of proving TrueCrypt was secure. That does not mean forked projects are...
Device encryption comes with added risk of having the disk "initialized" and modified by a windows install. I always use partition encryption.
Either way there is an audit of the code, for what it's worth now TC is no more.
What did you write? Can you paraphrase for the rest of us that did not see? Though, I highly doubt TC was ever snake oil.
Thanks. Yes, you can choose to set up a USB as a bootloader so you could indeed boot from that in place or as an alternative to cd/dvd. The...
Thank you. I appreciate that. It always helps to see something in action rather than jump into the unknown.
Makes sense.
Well I cannot speak for other people but I have always been told open source means the source code is available. But now I see descriptions and...
Regarding people who linked the official definition of open source. I posted that on reddit and got this response:...
I will mention it in my next video or I may add it to the description of the current video since that would be more relevant, but that will be...
Separate names with a comma.