The NSA keeps getting better at "cracking" encryption but pretty sure they still can't decrypt AES if the password is 20 random characters. If...
Interesting and good stuff but... The article says to purchase hardware anonymously but then goes on to recommend downloading a LINUX distro....
All this depends on how committed you are to blocking unencrypted traffic. For the average person just wanting to stay private, the software...
This may be secure enough for your purpose but many others would say that is a risky password formula. If the CIA/FBI/NSA/KGB (maybe even local...
Obviously I would never use a password generator that lived in the cloud! I would be surprised if it was not logged. How about this: Encrypt...
Tracked and recorded? If someone can track and record the output of your pw generator, couldn't they track and record the password(s) as you...
I think I understand your goal which is to render a back door in any 1 piece of software useless but.... Who's nightmare is this? Is this...
I don't know of any encryption software that has been verified, recently or otherwise. What exactly do you mean by "verified" anyway? As far as...
From what I gather from the posts you linked to and other recent discussions, this issue seems to be particularly common when running from...
First, do you have a hard disk somewhere with 230+ Gig of free space? The first step should be to make a sector by sector copy of the affected...
TrueCrypt can be useful and works just fine for many people. It is not the most friendly for novice users. I would even go so far as to say...
From my own experience and from reading hundreds of forum posts, here is what I would say about TrueCrypt stability. The vast majority of...
Enigm, Hadn't thought of it like that before but I couldn't agree more. PD is an advanced topic that only makes sense for advanced encryption...
Don't get me wrong, it is a good thing that this is open to the public but... It seems more of a publicity move than anything else. Just...
On the subject of using dictionary words in passphrase: http://xkcd.com/936/
A comment to follow up on Peter2150's advice... Even if your voiceprint is not traceable, your style of communication may still be unique to you....
Either get a UPS or make a copy of the data on flash, DVD, SSD whatever. Actually, make a backup whether you use a UPS or not. Encrypting your...
Because you were able to recover a few files, it looks like TC is decrypting the volume but there are errors on the disk. Your disk is failing or...
I understand about all the privacy concerns but I have found Google intrusion into my privacy to be nothing more than a minor annoyance. Using...
What is meant by "works the same" is that your file is encrypted and sent to the cloud. When you request your file back, it is sent to you and...
Being anonymous is sometimes good, sometimes bad. Just trying to make the point that privacy enthusiasts are saying that everything should be...
What are we really talking about when we use the word "privacy"? It is a recent development that we think of privacy and anonymity as the same...
Sorry, not trying to blow you away with techno babble. Technically, you are correct but the reality is that after 10 tries, the data is, for...
Don't know if you can image the encrypted data but it wouldn't do an attacker any good anyway. My understanding is that the master encryption...
If a backdoor existed, how long could the NSA keep it quiet? I agree with JohnMatrix. Three letter agencies would get more value for the money...
Separate names with a comma.