As already said, as a citizen who believes in Human Rights, I appreciate this. Thank you.
Re: The Vault - Hide your Files The encryption algorithm is fine, of course, since experienced cryptographers have elaborated it and the...
Re: The Vault - Hide your Files My try to be helpful was in advising the developer to get some experience on security and criptography before...
Probably, you have the luck to live in a country in which human rights are respected (at least to some extent) and in which you won't be...
Re: The Vault - Hide your Files You might be a very experienced programmer, but it sounds like you have no experience in security and...
If you have overwritten all the data on the hard disk, it is extremely hard (I would say impossible) that you will be able to get any of your data...
This is a way of encrypting data. Using a one-time pad is a DIFFERENT way, that serves different purposes. So, suggesting a different approach,...
Thanks a lot, I will give all these tools a look!
Well, what your customer says makes perfect sense. In order to buy something online, you don't technically need to have an account, so no...
I guess this is not the right section where to post this question. Anyways, the openvpn manual is clear and easy to follow.
Well yes, I am sure everybody worries. But what are the alternatives to using a password vault? Using the same complex password for all services?...
Your password is not crackable, but it might get stolen, unless you use it only in an environment totally secure under the physical point of view...
I admit I am too lazy to go search how you can use a YubbiKey with Truecrypt... will you tell me about it? :) Also, if you are going to use it...
This setup won't make you any anonymous. Just think: your "anonymous" server will be reached only from one IP (yours) and the data going out from...
I'm not here to defend Xerobank but, in general, if you are exchanging such information through email you had better use encryption, in the form...
Well, so make sure that the people who can be squeezed for information stays in the right jurisdictions ;)
I am not sure I get what you are saying... you are going to start a company or you are going to install a proxy-chain and offshore email for...
True. Also, IMO, it would be easier and more effective to think a new mathematical encryption alghoritm (maybe with longer key) when computer...
You could consider the use of a Aladdin eToken to use with TC, works GREAT.
Since I have been quoted quite a bit, I feel the need to post again on this topic: Steve, I know how the law works in USA, in Europe, and in...
Well, being able to use your SN account is pretty much the same as being able to use your identity on that particular social network. You might...
Just to be boring: it is not useful to zip an encrypted file: it won't get any smaller... maybe bigger.
Watch out CaixFang. Don't understimate the risks coming from a compromised account on any social network.
I'll go a little bit further and ask: What if LEO doesn't believe that you are only a consultant for Xero Networks AG, and that you are actually...
Two options that come to my mind are: 1) Use a long password, and give half to one persone and half to the other. If each half cannot be easily...
Separate names with a comma.